Search Results - (((((((kent OR cantini) OR ken) OR arte) OR cantor) OR anne) OR carter) OR cantion) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Mathematical models 34
- Data processing 33
- Artificial intelligence 26
- Machine learning 23
- Mathematics 21
- artificial intelligence 15
- Mathematical optimization 14
- Computer networks 12
- Data mining 11
- Artificial Intelligence 10
- Computer simulation 10
- Digital techniques 10
- History 10
- Management 10
- Neural networks (Computer science) 10
- Philosophy 10
- Security measures 9
- Algorithms 8
- Bioinformatics 8
- Machine Learning 8
- Social aspects 8
- methods 8
- Computational Biology 7
- Data Mining 7
- Diseases 7
- Electric power systems 7
- Electronic data processing 7
- Information technology 7
- Technological innovations 7
- algorithms 7
Search alternatives:
-
121
Polynomial root-finding and polynomiography
Published 2009Table of Contents: “…Approximation of square-roots and their visualizations -- The fundamental theorem of algebra and a special case of Taylor's theorem -- Introduction to the basic family and polynomiography -- Equivalent formulations of the basic family -- Basic family as dynamical system -- Fixed points of the basic family -- Algebraic derivation of the basic family and characterizations -- The truncated basic family and the case of Halley family -- Characterizations of solutions of homogeneous linear recurrence relations -- Generalization of Taylor's theorem and Newton's method -- The multipoint basic family and its order of convergence -- A computational study of the multipoint basic family -- A general determinantal lower bound -- Formulas for approximation of pi based on root-finding algorithms -- Bounds on roots of polynomials and analytic functions -- A geometric optimization and its algebraic offsprings -- Polynomiography : algorithms for visualization of polynomial equations -- Visualization of homogeneous linear recurrence relations -- Applications of polynomiography in art, education, science, and mathematics -- Approximation of square-roots revisited -- Further applications and extensions of the basic family and polynomiography.…”
Full text (MFA users only)
Electronic eBook -
122
Advances in Computational Intelligence : Theory & Applications
Published 2006Table of Contents: “…Wang -- 8. Ant colony algorithms: the state-of-the-art / J. Zhang, J. Xu, and S. …”
Full text (MFA users only)
Electronic eBook -
123
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
124
Optimization techniques and applications with examples
Published 2018Full text (MFA users only)
Electronic eBook -
125
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Table of Contents: “…Wiley Series; Title Page; Copyright; Table of Contents; List of Contributors; Preface; Part 1: Pattern Recognition in Sequences; Chapter 1: Combinatorial Haplotyping Problems; 1.1 Introduction; 1.2 Single Individual Haplotyping; 1.3 Population Haplotyping; References; Chapter 2: Algorithmic Perspectives of the String Barcoding Problems; 2.1 Introduction; 2.2 Summary of Algorithmic Complexity Results for Barcoding Problems; 2.3 Entropy-Based Information Content Technique for Designing Approximation Algorithms for String Barcoding Problems.…”
Full text (MFA users only)
Electronic eBook -
126
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
Full text (MFA users only)
Electronic eBook -
127
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Ross -- Virtual reality / Ken Hillis -- Virtuality / Michael Heim -- Walkthrough / Frederik De Grove and Jan Van Looy -- Web comics / Karin Kukkonen -- Wiki writing / Seth Perlow -- Windows / Jay David Bolter -- Word-image / Maria Engberg -- Worlds and maps / Bjarke Liboriussen -- Writing under constraint / Anastasia Salter.…”
Book -
128
-
129
Principles of artificial neural networks
Published 2013Table of Contents: “…Fundamentals of biological neural networks -- ch. 3. Basic principles of ANNs and their early structures. 3.1. Basic principles of ANN design. 3.2. …”
Full text (MFA users only)
Electronic eBook -
130
-
131
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
132
Learning OWL class expressions
Published 2010Table of Contents: “…Refinement Operator Based OWL Learning Algorithms; OCEL (OWL Class Expression Learner); Redundancy Elimination; Creating a Full Learning Algorithm; ELTL (EL Tree Learner)…”
Full text (MFA users only)
Electronic eBook -
133
Insect media : an archaeology of animals and technology
Published 2010Table of Contents: “…Introduction: insects in the age of technology -- Nineteenth-century insect technics the uncanny affects of insects -- Genesis of form: insect architecture and swarms -- Technics of nature and temporality: Uexküll's ethology -- Metamorphosis, intensity, and devouring space: elements for an insect game theory -- Intermezzo -- Animal ensembles, robotic affects: bees, milieus, and individuation -- Biomorphs and boids: swarming algorithms -- Sexual selection in the biodigital: teknolust and the weird life of SRAs -- Epilogue insect media as an art of transmutation.…”
Full text (MFA users only)
Electronic eBook -
134
An Eulerian Discontinuous Galerkin Method for the Numerical Simulation of Interfacial Transport.
Published 2017Table of Contents: “…List of Figures; Nomenclature; List of Tables; Nomenclature; 1 Introduction; 2 Equations of the Physical Model; 3 State of the Art of Numerical Methods; 4 An Introduction to DG Methods; 5 New Conservation Laws of SurfaceTransport Equations; 6 Exact Solutions to the Interfacial Surfactant Transport Equation; 7 A Narrow Band Method for the Eulerian Approach; 8 The Eulerian DG Algorithm and Numerical Results; 9 Conclusion; A Appendix.…”
Full text (MFA users only)
Electronic eBook -
135
Optimization in polymer processing
Published 2011Table of Contents: “…INTRODUCTION ; 2. STATE-OF-THE-ART ; 3. OPTIMIZATION METHODOLOGY.…”
Full text (MFA users only)
Electronic eBook -
136
Anaphora Resolution.
Published 2014Table of Contents: “…4.1 Early work in anaphora resolution4.2 Student; 4.3 Shrdlu; 4.4 Lunar; 4.5 Hobbs's naïve approach; 4.5.1 The algorithm; 4.5.2 Evaluation of Hobbs' s algorithm; 4.6 The BFP algorithm; 4.7 Carter's shallow processing approach; 4.8 Rich and LuperFoy's distributed architecture; 4.9 Carbonell and Brown's multi-strategy approach; 4.10 Other work; 4.11 Summary; Chapter Five: The present: knowledge-poor and corpus-based approaches in the 1990s and beyond; 5.1 Main trends in recent anaphora resolution research; 5.2 Collocation patterns-based approach; 5.3 Lappin and Leass's algorithm; 5.3.1 Overview.…”
Full text (MFA users only)
Electronic eBook -
137
-
138
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
139
-
140
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook