Search Results - (((((((kant OR hands) OR wkanting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 37
- Artificial intelligence 32
- Machine learning 31
- Mathematical models 25
- Algorithms 20
- Mathematics 20
- artificial intelligence 19
- Data mining 17
- algorithms 17
- Technological innovations 14
- Computer algorithms 13
- Computer networks 13
- Management 13
- methods 12
- Artificial Intelligence 11
- Big data 11
- Digital techniques 11
- Signal processing 11
- Information technology 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Application software 9
- Computer security 9
- Development 9
- Social aspects 9
- Data Mining 8
- Machine Learning 8
- Security measures 8
- Computer science 7
- Diseases 7
Search alternatives:
- kant »
- wkanting »
- markant »
-
41
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Table of Contents: “…; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras…”
Full text (MFA users only)
Electronic eBook -
42
Uberland : how algorithms are rewriting the rules of work
Published 2018Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
Full text (MFA users only)
Electronic eBook -
43
Reconstructive surgery of the hand and upper extremity
Published 2018Table of Contents: “…Dorsal Soft Tissue Injury to Finger and Hand -- 24. Volar Soft Tissue Injury to Finger and Hand/Palm -- 25. …”
Full text (MFA users only)
Electronic eBook -
44
Fundamentals of grid computing : theory, algorithms and technologies
Published 2010Table of Contents: “…Cover; Title; Copyright; Contents; List of Figures; List of Tables; Foreword; Preface; Chapter 1: Grid computing overview; Chapter 2: Synchronization protocols for sharing resources in grid environments; Chapter 3: Data replication in grid environments; Chapter 4: Data management in grids; Chapter 5: Future of grids resources management; Chapter 6: Fault-tolerance and availability awareness in computational grids; Chapter 7: Fault tolerance for distributed scheduling in grids; Chapter 8: Broadcasting for grids; Chapter 9: Load balancing algorithms for dynamic networks.…”
Full text (MFA users only)
Electronic eBook -
45
Between stillness and motion : film, photography, algorithms
Published 2011Full text (MFA users only)
Electronic eBook -
46
Machine learning : hands-on for developers and technical professionals
Published 2020Full text (MFA users only)
Electronic eBook -
47
Deep learning with Python : a hands-on introduction
Published 2017Table of Contents: “…Stochastic; Challenges with SGD; Local Minima; Saddle Points; Selecting the Learning Rate; Slow Progress in Narrow Valleys; Algorithmic Variations on SGD; Momentum.…”
Full text (MFA users only)
Electronic eBook -
48
-
49
Algorithmic problems of group theory, their complexity, and applications to cryptography
Published 2015Table of Contents: “…Formal Definition -- 3. Shamirâ€?s Secret Sharing Scheme -- 4. Secret Sharing Using Non-commutative Groups -- 5. …”
Full text (MFA users only)
Electronic eBook -
50
-
51
Parallel Scientific Computing.
Published 2015Table of Contents: “…Performance analysis -- 3 Parallel Algorithm Concepts -- 3.1. Parallel algorithms for recurrences -- 3.2. …”
Full text (MFA users only)
Electronic eBook -
52
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
53
Computational technologies. Advanced topics
Published 2015Full text (MFA users only)
Electronic eBook -
54
-
55
Stochastic processes in polymeric fluids : tools and examples for developing simulation algorithms
Published 1996Full text (MFA users only)
Electronic eBook -
56
-
57
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
Full text (MFA users only)
Electronic eBook -
58
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
59
Adventures in Raspberry Pi
Published 2017Table of Contents: “…Creating Health-Point-Stealing Sprites -- Improving the Movement of the Adventurer Sprite Using if Blocks -- Creating a Game Over Screen -- Ideas for Improvements to Your Game -- Adventure 4 Programming Shapes with Turtle Graphics -- Scratch Turtle Graphics -- Using Pen Down and Pen Up -- Drawing Simple Shapes -- Using "clear" and Setting a Start Point -- Using Variables Instead of Values -- Changing the Size and Colour of the Pen -- Creating Spiral Patterns -- Using User Input to Determine the Number of Sides -- Python Turtle Graphics -- Introducing Python Modules -- The Python 3 Environment and the Interpreter Window -- Using the Turtle Module in Python -- The range Function -- Other Python Turtle Module Commands -- Some Super Spirals -- Further Adventures with Python Turtle -- Adventure 5 Programming with Python -- Getting Set Up for Python -- Python Programming Language -- The IDLE Environment -- Programming in Python: Using a Function -- Using a Text Editor to Create a Code File -- Using the Python time and random Modules -- Python Text Adventure Game -- Getting User Input -- Using Conditionals -- Using a while Loop -- Using a Variable for Health Points -- Putting It All Together -- Defining Functions -- Creating a Main Game Loop -- Continuing Your Python Adventure -- Adventure 6 Programming Minecraft Worlds on the Raspberry Pi -- Getting Started with Minecraft Pi -- Your First Minecraft Pi Python Program -- Using Coordinates in Minecraft Pi -- Finding the Player's Location -- Changing the Player's Location -- Placing a Block -- Placing Multiple Blocks -- Types of Blocks -- Creating a TNT Chain Reaction -- Creating a Diamond Transporter -- Sharing and Cloning Minecraft Pi Programs -- Adventure 7 Coding Music with Sonic Pi -- Getting Started with Sonic Pi -- The Sonic Pi Interface -- Creating Your First Sounds with Sonic Pi.…”
Full text (MFA users only)
Electronic eBook -
60
Kienböck's disease : advances in diagnosis and treatment
Published 2016Full text (MFA users only)
Electronic eBook