Search Results - (((((((kant OR jantti) OR semantic) OR wind) OR cantor) OR anne) OR share) OR hints) algorithms.

Search alternatives:

  1. 281
  2. 282
  3. 283

    Engineering solutions for manufacturing processes IV : selected, peer reviewed papers from the 2013 4th International Conference on Advances in Materials and Manufacturing (ICAMMP...

    Published 2014
    Table of Contents: “…Multi-Objective Optimization of the FOFAS Based on the Workbench/ExplorationThe Optimization Design of Wind Turbine Gearbox Based on Improved Genetic Algorithm and Feasibility Analysis; Reverse Design from Virtual Manufacturing; Quadruple-Arc Gear Tooth Profile Parameterize Optimization Based on ANSYS; Application of Advertising Based on Computer Aided Visual Design; Finite Element Analysis and Multi-Objective Optimization of the Precision Horizontal Machining Center Bed; Calculation of the Scattering Coefficient of Large Scale Periodic Structure…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 284

    Medical data privacy handbook

    Published 2015
    Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
    Full text (MFA users only)
    Electronic eBook
  5. 285

    Artificial Intelligence Research and Development. by Riaño, D.

    Published 2012
    Table of Contents: “…Using Gabriel Graphs in Borderline-SMOTE to Deal with Severe Two-Class Imbalance Problems on Neural NetworksActive Learning of Actions Based on Support Vector Machines; Towards the Formalization of Re-Identification for Some Data Masking Methods; Natural Language Processing and Recommenders; Towards Object Descriptions in Natural Language from Qualitative Models; Semantically-Enhanced Recommenders; Computer Vision; Supervised Texture Classification Using Optimization Techniques; Modelling Facial Expressions Dynamics with Gaussian Process Regression; Survey on 2D and 3D Human Pose Recovery…”
    Full text (MFA users only)
    Electronic eBook
  6. 286

    Biomedical image understanding : methods and applications

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  7. 287
  8. 288

    Cryptography : protocols, design, and applications

    Published 2012
    Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
    Full text (MFA users only)
    Electronic eBook
  9. 289

    Uncommon sense : investment wisdom since the stock market's dawn by Kemp, Michael E.

    Published 2015
    Table of Contents: “…-- RELATING BOOK VALUE PER SHARE TO MARKET PRICE -- WHAT IS A LOW P/B RATIO TELLING US? …”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics by Ahmadian, Amir Sharif

    Published 2016
    Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference. by Arena, Paolo, Fortuna, Luigi

    Published 2006
    Table of Contents: “…Integrated operations in arctic environments / F. wre. Can the semantic web be designed without using fuzzy logic? …”
    Full text (MFA users only)
    Electronic eBook
  12. 292

    The linguistic cerebellum

    Published 2015
    Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
    Full text (MFA users only)
    Electronic eBook
  13. 293

    Systemic Risk from Global Financial Derivatives. by Markose, Sheri M.

    Published 2012
    Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
    Full text (MFA users only)
    Electronic eBook
  14. 294
  15. 295

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  16. 296

    Database technology for life sciences and medicine

    Published 2010
    Table of Contents: “…Document authoring and searching. 3.5. Sharing distributed biomedical data. 3.6. The architecture of SciPort. 3.7. …”
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Handbook on soft computing for video surveillance

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  19. 299

    Predictive Analytics For Dummies. by Bari, Anasse

    Published 2016
    Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
    Full text (MFA users only)
    Electronic eBook
  20. 300

    Data analytics and big data by Sedkaoui, Soraya

    Published 2018
    Table of Contents: “…Data analytics and machine learning: the relevance of algorithms -- Machine learning: a method of data analysis that automates analytical model building -- Supervised versus unsupervised algorithms: a guided tour -- Applications and examples.…”
    Full text (MFA users only)
    Electronic eBook