Search Results - (((((((kent OR wanthi) OR wanting) OR went) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 29
- Artificial intelligence 25
- Machine learning 25
- Data mining 17
- Mathematics 17
- Algorithms 15
- Mathematical models 14
- algorithms 14
- artificial intelligence 14
- Technological innovations 13
- Application software 11
- Computer networks 11
- Development 11
- Computer algorithms 10
- Information technology 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- methods 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Social aspects 9
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- History 6
- Mathematical optimization 6
- Parallel processing (Electronic computers) 6
- Research 6
Search alternatives:
- kent »
-
81
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
82
Critical Digital Humanities : The Search for a Methodology
Published 2019Full text (MFA users only)
Electronic eBook -
83
Introduction to identity-based encryption
Published 2008Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
Full text (MFA users only)
Electronic eBook -
84
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
85
Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals
Published 2022Table of Contents: “…Words matter -- Propaganda -- Satire -- Advertising -- Public trust in journalism -- 7. Algorithms, Bots, Trolls, Cyborgs and Artificial Intelligence -- Algorithms -- Bots, trolls, cyborgs and other inauthentic activity -- 8. …”
Full text (MFA users only)
Electronic eBook -
86
Artificial Intelligence in Semiconductor Industry - Materials to Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
Full text (MFA users only)
Electronic eBook -
87
Media technologies : essays on communication, materiality, and society
Published 2014Table of Contents: “…Bowker -- "What Do We Want?" "Materiality!" "When Do We Want It?" "Now!" …”
Full text (MFA users only)
Electronic eBook -
88
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
89
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
90
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
91
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
92
Applied Parallel Computing.
Published 2012Table of Contents: “…Design of Algorithms; 5.1. Algorithm Models; 5.1.1. Master-slave; 5.1.2. …”
Full text (MFA users only)
Electronic eBook -
93
Blockchain-based peer-to-peer transactions in energy systems
Published 2023Table of Contents: “…Smart contract-based peer-to-peer energy storage-sharing architecture and algorithm -- 8.3. Smart contract functions for the storage-sharing scheme -- 8.4. …”
Full text (MFA users only)
Electronic eBook -
94
Biological systematics : principles and applications
Published 2021Full text (MFA users only)
Electronic eBook -
95
Biomedical image analysis recipes in MATLAB : for life scientists and engineers
Published 2015Full text (MFA users only)
Electronic eBook -
96
Multi-label dimensionality reduction
Published 2014Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
Full text (MFA users only)
Electronic eBook -
97
Elements of quantum computation and quantum communication
Published 2013Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
Full text (MFA users only)
Electronic eBook -
98
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
99
Trends in Functional Programming.
Published 2007Table of Contents: “…Front Cover; Preliminary Pages; Contents; Preface; Proving Termination Using Dependent Types: The Case of Xor-Terms; Proving the Correctness of Algorithmic Debugging for Functional Programs; Systematic Synthesis of Functions; A Purely Functional Implementation of ROBDDs in Haskell; Efficient Interpretation by Transforming Data Types and Patterns to Functions; Object-Oriented Programming in Dependent Type Theory; A Sharing Analysis for SAFE; Memory Usage Improvement Using Runtime Alias Detection; A Model of Functional Programming with Dynamic Compilation and Optimization.…”
Full text (MFA users only)
Electronic eBook -
100
Risk management technology in financial services : risk control, stress testing, models, and IT systems and structures
Published 2007Table of Contents: “…-- Chapter 3 Complxity of risk control with derivatives -- Chapter 4 Intergrating risk management through an enterprise architecure -- Chapter 5 Case studies on big product problems that went unattended -- Part 2 Risk control methodology and advanced models -- Chapter 6 A methodology for risk management -- Chapter 7 The contribution of models to experimentation -- Chapter 8 Simulation -- Chapter 9 Using knowledge engineering for risk control -- Chapter 10 Optimization through genetic algorithms -- Chapter 11 Testing, backtesting, post-mortems and experimental methodology -- Part 3 Increasing the effectiveness of information systems support -- Chapter 12 Adding value to risk control through IT and organization -- Chapter 13 Technology for time management, high frequency financial data and high impact events -- Chapter 14 Project management for IT and risk control -- Chapter 15 Implementing design reviews -- Chapter 16 Quality, reliability and availability -- Chapter 17 Being in charge of IT costs -- Index.…”
Full text (MFA users only)
Electronic eBook