Search Results - (((((((kant OR jantti) OR semantic) OR wind) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 36
- Data processing 29
- Mathematics 25
- Machine learning 19
- Mathematical models 19
- Technological innovations 19
- Data mining 18
- Algorithms 16
- Management 15
- algorithms 15
- artificial intelligence 15
- Computer science 14
- Big data 12
- Information technology 12
- Computer algorithms 11
- Computer networks 11
- Artificial Intelligence 9
- Automatic control 9
- Computational linguistics 8
- Data Mining 8
- Neural networks (Computer science) 8
- Research 8
- Social aspects 8
- Electric power systems 7
- Logic, Symbolic and mathematical 7
- Manufacturing processes 7
- Mathematical optimization 7
- Mechatronics 7
- Bioinformatics 6
- Computer security 6
Search alternatives:
- jantti »
-
281
Automatic control and mechatronic engineering III : selected, peer reviewed papers from the 3rd International Conference on Automatic Control and Mechatronic Engineering (ICACME 20...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
282
Topics On Mathematics For Smart Systems : Proceedings of the European Conference.
Published 2007Full text (MFA users only)
Electronic eBook -
283
Engineering solutions for manufacturing processes IV : selected, peer reviewed papers from the 2013 4th International Conference on Advances in Materials and Manufacturing (ICAMMP...
Published 2014Table of Contents: “…Multi-Objective Optimization of the FOFAS Based on the Workbench/ExplorationThe Optimization Design of Wind Turbine Gearbox Based on Improved Genetic Algorithm and Feasibility Analysis; Reverse Design from Virtual Manufacturing; Quadruple-Arc Gear Tooth Profile Parameterize Optimization Based on ANSYS; Application of Advertising Based on Computer Aided Visual Design; Finite Element Analysis and Multi-Objective Optimization of the Precision Horizontal Machining Center Bed; Calculation of the Scattering Coefficient of Large Scale Periodic Structure…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
284
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook -
285
Artificial Intelligence Research and Development.
Published 2012Table of Contents: “…Using Gabriel Graphs in Borderline-SMOTE to Deal with Severe Two-Class Imbalance Problems on Neural NetworksActive Learning of Actions Based on Support Vector Machines; Towards the Formalization of Re-Identification for Some Data Masking Methods; Natural Language Processing and Recommenders; Towards Object Descriptions in Natural Language from Qualitative Models; Semantically-Enhanced Recommenders; Computer Vision; Supervised Texture Classification Using Optimization Techniques; Modelling Facial Expressions Dynamics with Gaussian Process Regression; Survey on 2D and 3D Human Pose Recovery…”
Full text (MFA users only)
Electronic eBook -
286
Biomedical image understanding : methods and applications
Published 2014Full text (MFA users only)
Electronic eBook -
287
Progress reports on impedance spectroscopy : measurements, modeling, and application
Published 2017Full text (MFA users only)
Electronic eBook -
288
Cryptography : protocols, design, and applications
Published 2012Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
Full text (MFA users only)
Electronic eBook -
289
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Table of Contents: “…-- RELATING BOOK VALUE PER SHARE TO MARKET PRICE -- WHAT IS A LOW P/B RATIO TELLING US? …”
Full text (MFA users only)
Electronic eBook -
290
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
291
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…Integrated operations in arctic environments / F. wre. Can the semantic web be designed without using fuzzy logic? …”
Full text (MFA users only)
Electronic eBook -
292
The linguistic cerebellum
Published 2015Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
Full text (MFA users only)
Electronic eBook -
293
Systemic Risk from Global Financial Derivatives.
Published 2012Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
Full text (MFA users only)
Electronic eBook -
294
Introduction to Modern Algebra and Its Applications.
Published 2020Full text (MFA users only)
Electronic eBook -
295
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
296
Database technology for life sciences and medicine
Published 2010Table of Contents: “…Document authoring and searching. 3.5. Sharing distributed biomedical data. 3.6. The architecture of SciPort. 3.7. …”
Full text (MFA users only)
Electronic eBook -
297
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
298
Handbook on soft computing for video surveillance
Published 2012Full text (MFA users only)
Electronic eBook -
299
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook -
300
Data analytics and big data
Published 2018Table of Contents: “…Data analytics and machine learning: the relevance of algorithms -- Machine learning: a method of data analysis that automates analytical model building -- Supervised versus unsupervised algorithms: a guided tour -- Applications and examples.…”
Full text (MFA users only)
Electronic eBook