Search Results - (((((((kant OR kwanta) OR wants) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 29
- Artificial intelligence 25
- Machine learning 25
- Data mining 17
- Mathematics 17
- Algorithms 15
- Mathematical models 14
- algorithms 14
- artificial intelligence 14
- Technological innovations 12
- Application software 11
- Computer networks 11
- Development 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Information technology 9
- methods 9
- Social aspects 8
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Mathematical optimization 6
- Parallel processing (Electronic computers) 6
- Wireless communication systems 6
- Bioinformatics 5
Search alternatives:
-
281
Open science by design : realizing a vision for 21st century research
Published 2018Full text (MFA users only)
Electronic eBook -
282
Integration of swarm intelligence and artificial neural network
Published 2011Full text (MFA users only)
Electronic eBook -
283
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Full text (MFA users only)
Electronic eBook -
284
Large Scale Network-Centric Distributed Systems
Published 2014Full text (MFA users only)
Electronic eBook -
285
Discovering knowledge in data : an introduction to data mining
Published 2014Table of Contents: “…DISCOVERING KNOWLEDGE IN DATA -- Contents -- Preface -- 1 An Introduction to Data Mining -- 1.1 What is Data Mining? -- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
Full text (MFA users only)
Electronic eBook -
286
Building Machine Learning Systems with Python.
Published 2013Full text (MFA users only)
Electronic eBook -
287
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
288
Graph drawing and applications for software and knowledge engineers
Published 2002Full text (MFA users only)
Electronic eBook -
289
Deep Learning with Pytorch Quick Start Guide : Learn to Train and Deploy Neural Network Models in Python.
Published 2018Full text (MFA users only)
Electronic eBook -
290
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
291
Banking and finance issues in emerging markets.
Published 2018Full text (MFA users only)
Electronic eBook -
292
Symbolic computation and education
Published 2007Full text (MFA users only)
Electronic Conference Proceeding eBook -
293
-
294
Informatics for Health
Published 2017Table of Contents: “…Connected and Digital Health -- Design and Validation of a Platform to Evaluate mHealth Apps -- Reasoning and Data Representation in a Health and Lifestyle Support System -- Feasibility of Representing a Danish Microbiology Model Using FHIR -- Establishment of Requirements and Methodology for the Development and Implementation of GreyMatters, a Memory Clinic Information System -- Nurses' Perspectives on In-Home Monitoring of Elderlies's Motion Pattern -- Monitoring Activities Related to Medication Adherence in Ambient Assisted Living Environments -- Design, Implementation and Operation of a Reading Center Platform for Clinical Studies -- Web Validation Service for Ensuring Adherence to the DICOM Standard -- A Decision Support System for Cardiac Disease Diagnosis Based on Machine Learning Methods -- Severity Summarization and Just in Time Alert Computation in mHealth Monitoring -- Towards Safe and Efficient Child Primary Care -- Gaps in the Use of Unique Identifiers in Europe -- Why Are Children's Interests Invisible in European National E-Health Strategies? -- Shared Decision Making via Personal Health Record Technology for Routine Use of Diabetic Youth: A Study Protocol -- A Medication Reminder Mobile App: Does It Work for Different Age Ranges -- Internet of Things in Health Trends Through Bibliometrics and Text Mining -- Developing the Safety Case for MediPi: An Open-Source Platform for Self Management -- UK Health and Social Care Case Studies: Iterative Technology Development -- 2. …”
Full text (MFA users only)
Electronic eBook -
295
Progress reports on impedance spectroscopy : measurements, modeling, and application
Published 2017Full text (MFA users only)
Electronic eBook -
296
Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization
Published 2019Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
Full text (MFA users only)
Electronic eBook -
297
Architecture-aware optimization strategies in real-time image processing
Published 2017Full text (MFA users only)
Electronic eBook -
298
Digital information ecosystems : smart press
Published 2019Table of Contents: “…The problem of revenue sharing between media and social networks; 6.2. The social network eco-system; 6.2.1. …”
Full text (MFA users only)
Electronic eBook -
299
Binary decision diagrams and extensions for system reliability analysis
Published 2015Table of Contents: “…7.5 Applications to Phased-Mission Systems -- 7.5.1 Mini-Component Concept -- 7.5.2 Extended SEA Method for PMS -- 7.5.3 An Illustrative Example -- 7.6 Summary -- 8 Shared Decision Diagrams -- 8.1 Multi-Rooted Decision Diagrams -- 8.2 Multi-Terminal Decision Diagrams -- 8.3 Performance Study on Multi-State Systems -- 8.3.1 Example Analyses -- 8.3.2 Benchmark Studies -- 8.4 Application to Phased-Mission Systems -- 8.4.1 PMS Analysis Using MDDs -- 8.4.1.1 Step 1-Variable Encoding -- 8.4.1.2 Step 2-Input Variable Ordering -- 8.4.1.3 Step 3-PMS MDD Generation -- 8.4.1.4 Step 4-PMS MDD Evaluation -- 8.4.2 An Illustrative Example -- 8.5 Application to Multi-State k-out-of-n Systems -- 8.5.1 Multi-State k-out-of-n System Analysis Using MDDs -- 8.5.1.1 Step 1- BDDkl Generation -- 8.5.1.2 Step 2- MDDkl Generation -- 8.5.1.3 Step 3- MDDSj Generation -- 8.5.1.4 Step 4-System MDDSj Evaluation -- 8.5.2 An Illustrative Example -- 8.6 Importance Measures -- 8.6.1 Capacity Networks and Reliability Modeling -- 8.6.2 Composite Importance Measures (Type 1) -- 8.6.2.1 General CIMs -- 8.6.2.2 Alternative CIMs -- 8.6.3 Computing CIMs Using MDD -- 8.6.4 An Illustrative Example -- 8.7 Failure Frequency Based Measures -- 8.8 Summary -- Conclusions -- References -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
300
Advanced security solutions for multimedia
Published 2021Full text (MFA users only)
Electronic eBook