Search Results - (((((((kant OR want) OR semantic) OR win) OR cantor) OR anne) OR blaney) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 39
- Data processing 31
- Machine learning 27
- Data mining 21
- artificial intelligence 20
- Python (Computer program language) 15
- Artificial Intelligence 14
- Algorithms 13
- Mathematics 13
- Technological innovations 13
- Mathematical models 12
- Data Mining 11
- Computer science 10
- Neural networks (Computer science) 10
- algorithms 10
- Machine Learning 9
- methods 9
- Application software 8
- Big data 8
- Development 8
- Information technology 8
- Social aspects 8
- Computational linguistics 7
- Computer networks 7
- Management 7
- Pattern recognition systems 7
- Computer algorithms 6
- Computer security 6
- Digital media 6
- History 6
Search alternatives:
- kant »
- win »
-
221
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
222
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Full text (MFA users only)
Electronic eBook -
223
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…Integrated operations in arctic environments / F. wre. Can the semantic web be designed without using fuzzy logic? …”
Full text (MFA users only)
Electronic eBook -
224
The linguistic cerebellum
Published 2015Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
Full text (MFA users only)
Electronic eBook -
225
Informatics for Health
Published 2017Table of Contents: “…An Automatic Approach for Analyzing Treatment Effectiveness Based on Medication Hierarchy -- The Myocardial Infarction Case Study -- Evaluation of Machine Learning Methods to Predict Coronary Artery Disease Using Metabolomic Data -- Dermatology Disease Prediction Based on Two Step Cascade Genetic Algorithm Optimization of ANFIS Parameters -- Querying EHRs with a Semantic and Entity-Oriented Query Language -- Evaluation of the Terminology Coverage in the French Corpus LiSSa -- Linked Data Applications Through Ontology Based Data Access in Clinical Research -- Epidemiological Models Lacking Process Noise Can Be Overconfident -- Disentangling Prognostic and Predictive Biomarkers Through Mutual Information -- IntegrIT -- Towards Utilizing the Swedish National Health Information Exchange Platform for Clinical Research -- Introducing a Method for Transformation of Paper-Based Research Data into Concept-Based Representation with openEHR -- The P̀EARL' Data Warehouse: Initial Challenges Faced with Semantic and Syntactic Interoperability -- Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data -- Application of Correspondence Analysis to Graphically Investigate Associations Between Foods and Eating Locations -- Data Driven Quality Improvement of Health Professions Education: Design and Development of CLUE -- An Interactive Curriculum Data Visualization Tool -- Developing Healthcare Data Analytics APPs with Open Data Science Tools -- Fast and Efficient Feature Engineering for Multi-Cohort Analysis of EHR Data -- Development and Evaluation of a Case-Based Retrieval Service -- Learning Differentially Expressed Gene Pairs in Microarray Data -- Developing a Manually Annotated Corpus of Clinical Letters for Breast Cancer Patients on Routine Follow-Up -- Automated Diagnosis Coding with Combined Text Representations.…”
Full text (MFA users only)
Electronic eBook -
226
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
227
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
228
Handbook on soft computing for video surveillance
Published 2012Full text (MFA users only)
Electronic eBook -
229
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook -
230
-
231
Machine learning for the web
Published 2016Table of Contents: “…Multinomial Naive BayesGaussian Naive Bayes; Decision trees; Support vector machine; Kernel trick; A comparison of methods; Regression problem; Classification problem; Hidden Markov model; A Python example; Summary; Web Mining Techniques; Web structure mining; Web crawlers (or spiders); Indexer; Ranking -- PageRank algorithm; Web content mining; Parsing; Natural language processing; Information retrieval models; TF-IDF; Latent Semantic Analysis (LSA); Doc2Vec (word2vec); Word2vec -- continuous bag of words and skip-gram architectures; Mathematical description of the CBOW model.…”
Full text (MFA users only)
Electronic eBook -
232
Introduction to graph and hypergraph theory
Published 2009Full text (MFA users only)
Electronic eBook -
233
Beyond artificial intelligence : from human consciousness to artificial consciousness
Published 2018Table of Contents: “…The morphological and semantic conformation of the psychic system; 1.13. …”
Full text (MFA users only)
Electronic eBook -
234
Computational phraseology
Published 2020Table of Contents: “…Monocollocable words : a type of language combinatory periphery / František Čermák -- Translation asymmetries of multiword expressions in machine translation : an analysis of the TED-MWE corpus / Johanna Monti, Mihael Arcan and Federico Sangati -- German constructional phrasemes and their Russian counterparts : a corpus-based study / Dmitrij Dobrovol'skij -- Computational phraseology and translation studies : from theoretical hypotheses to practical tools / Jean-Pierre Colson -- Computational extraction of formulaic sequences from corpora : two case studies of a new extraction algorithm / Alexander Wahl and Stefan Th. Gries -- Computational phraseology discovery in corpora with the MWETOOLKIT / Carlos Ramisch -- Multiword expressions in comparable corpora / Peter Ďurčo -- Collecting collocations from general and specialised corpora : a comparative analysis / Marie-Claude L'Homme and Daphnée Azoulay -- What matters more : the size of the corpora or their quality? …”
Full text (MFA users only)
Electronic eBook -
235
Screenplay and narrative theory : the screenplectics model of complex narrative systems
Published 2015Full text (MFA users only)
Electronic eBook -
236
Signalized Flows : Optimizing Traffic Signals and Guideposts and Related Network Flow Problems.
Published 2013Full text (MFA users only)
Electronic eBook -
237
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
238
SMS communication : a linguistic approach
Published 2014Full text (MFA users only)
Electronic eBook -
239
Twelfth Scandinavian Conference on Artificial Intelligence : SCAI 2013
Published 2013Table of Contents: “…Traceable Uncertainty for Threat Evaluation in Air to Ground ScenariosKnowledge-Based Industrial Robotics; Probabilistic Inference in BN2T Models by Weighted Model Counting; Doctoral Symposium; On Programming Organization-Aware Agents; Enhancing Recall in Semantic Querying; Industrial Robot Skills; Learning Inverse Kinematics Problem in Changing Task Environment; Neural Network for Prediction of Glucose Concentration in Type 1 Diabetic Patients; Subject Index; Author Index…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
240
Structural-functional studies in English grammar : in honor of Lachlan Mackenzie
Published 2007Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
Full text (MFA users only)
Electronic eBook