Search Results - (((((((kent OR wkant) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 52
- Data processing 51
- Mathematics 41
- Mathematical models 33
- Machine learning 28
- artificial intelligence 26
- Algorithms 23
- Data mining 23
- Technological innovations 21
- Artificial Intelligence 19
- Social aspects 19
- algorithms 19
- Computer networks 16
- Mathematical optimization 16
- History 15
- Big data 13
- Computer algorithms 13
- Computer science 13
- Python (Computer program language) 13
- methods 13
- Data Mining 12
- Image processing 12
- Information technology 12
- Research 12
- Statistical methods 12
- Digital techniques 11
- Engineering 11
- Management 11
- Decision making 10
- Development 10
Search alternatives:
- kent »
-
421
SMS communication : a linguistic approach
Published 2014Full text (MFA users only)
Electronic eBook -
422
Structural-functional studies in English grammar : in honor of Lachlan Mackenzie
Published 2007Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
Full text (MFA users only)
Electronic eBook -
423
How to measure anything in cybersecurity risk
Published 2016Table of Contents: “…; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?…”
Full text (MFA users only)
Electronic eBook -
424
-
425
Materials science and processing, environmental engineering and information technologies : selected, peer reviewed papers from the 2014 International Conference on Application of M...
Published 2014Table of Contents: “…Materials Science and Processing, Environmental Engineering and Information Technologies; Preface and Organizing Committee; Table of Contents; Chapter 1: Materials for Mechanical Engineering and Technologies of Materials Processing; Wear Behaviors of PCBN Tools in Interrupted Turning Hardened Steel with Tool's Chamfer Angle and Edge Preparation Considered; Sintering of Frustum Shaped Polycrystalline Diamond Compact at Non-Hydrostatic Pressure; Experimental Research on Fabrication Process of Metal Powder for SLS; Hot Sizing Experiment Study of TC4 Titanium Alloy Bending Plate…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
426
-
427
Advanced Research in Materials and Engineering Applications
Published 2015Full text (MFA users only)
Electronic eBook -
428
Statistical analysis techniques in particle physics : fits, density estimation and supervised learning
Published 2013Full text (MFA users only)
Electronic eBook -
429
Limits, Limits Everywhere : the Tools of Mathematical Analysis
Published 2012Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
Full text (MFA users only)
Electronic eBook -
430
Multiple Sclerosis : Clinician's Guide to Diagnosis and Treatment.
Published 2013Table of Contents: “…Long-Term Disease-Modifying Therapies; Issues with Long-Term Immune-Modulating Therapies; Choosing a Disease-Modifying Therapy; Ensuring Treatment Adherence and Compliance; When Do I Initiate Treatment With Disease-Modifying Therapies?…”
Full text (MFA users only)
Electronic eBook -
431
Robust statistics : theory and methods (with R)
Published 2018Full text (MFA users only)
Electronic eBook -
432
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
433
Decision Intelligence for Dummies
Published 2022Table of Contents: “…Any road will take you there -- The great rethink when it comes to making decisions at scale -- Applying the Upside-Down V: The Path to the Output and Back Again -- Evaluating Your Inverted V Revelations -- Having Your Inverted V Lightbulb Moment -- Recognizing Why Things Go Wrong -- Aiming for too broad an outcome -- Mimicking data outcomes -- Failing to consider other decision sciences -- Mistaking gut instincts for decision science -- Failing to change the culture -- Part 2 Reaching the Best Possible Decision -- Chapter 5 Shaping a Decision into a Query -- Defining Smart versus Intelligent -- Discovering That Business Intelligence Is Not Decision Intelligence -- Discovering the Value of Context and Nuance -- Defining the Action You Seek -- Setting Up the Decision -- Chapter 6 Mapping a Path Forward -- Putting Data Last -- Recognizing when you can (and should) skip the data entirely -- Leaning on CRISP-DM -- Using the result you seek to identify the data you need -- Digital decisioning and decision intelligence -- Don't store all your data - know when to throw it out -- Adding More Humans to the Equation -- The shift in thinking at the business line level -- How decision intelligence puts executives and ordinary humans back in charge -- Limiting Actions to What Your Company Will Actually Do -- Looking at budgets versus the company will -- Setting company culture against company resources -- Using long-term decisioning to craft short-term returns -- Chapter 7 Your DI Toolbox -- Decision Intelligence Is a Rethink, Not a Data Science Redo -- Taking Stock of What You Already Have -- The tool overview -- Working with BI apps -- Accessing cloud tools -- Taking inventory and finding the gaps -- Adding Other Tools to the Mix -- Decision modeling software -- Business rule management systems -- Machine learning and model stores -- Data platforms.…”
Full text (MFA users only)
Electronic eBook -
434
A Statistical approach to genetic epidemiology : concepts and applications, with an e-Learning Platform.
Published 2012Table of Contents: “…; 4.3 HOW SHOULD GENOTYPING ERRORS BE CHECKED IN POPULATION-BASED STUDIES USING THE HARDY-WEINBERG EQUILIBRIUM?; Algorithm 4.1.; Algorithm 4.2.; Algorithm 4.3.; 4.4 HOW CAN GENOTYPING ERRORS BE DETECTED IN HIGH-THROUGHPUT GENOTYPING STUDIES?…”
Full text (MFA users only)
Electronic eBook -
435
Modern development in materials, machinery and automation : selected, peer reviewed papers from the 2013 International Conference on Microtechnology and MEMS (ICMM 2013), May 22-23...
Published 2013Table of Contents: “…An Adaptive Intra-Frame Refresh Algorithm Based on Rate Distortion OptimizationA New Method for the Optimal Configuration of Ship-Based Aircraft Based on the Extended Backpack; Application of Bayesian for the Situation Assessment of Sea-Battlefield; The Application of Semantic Similarity in Text Classification; The Research of Clock Traffic Congestion Model and Synchronization Technology; Chapter 4: Product Design; Research on Motion Capture Instruments in Sports; A Study of Innovative Product Design for Drinking Cups; A Study of Customized Innovative Self-Portrait Product Design…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
436
Drones and other unmanned weapons systems under international law
Published 2018Full text (MFA users only)
Electronic eBook -
437
The Maudsley Prescribing Guidelines in Psychiatry
Published 2012Full text (MFA users only)
Electronic eBook -
438
Creating wicked students : designing courses for a complex world
Published 2018Full text (MFA users only)
Electronic eBook -
439
Methodological and analytic frontiers in lexical research
Published 2012Table of Contents: “…Behavioral profiles: A fine-grained and quantitative approach in corpus-based lexical semantics (by Gries, Stefan Th.); 5. 5. Using a maze task to track lexical and sentence processing (by Forster, Kenneth I.); 6. 6. …”
Full text (MFA users only)
Electronic eBook -
440
Formal Synthesis of Safety Controller Code for Distributed Controllers.
Published 2012Table of Contents: “…7.3 Comparison8 Embedding Control Functions in IEC 61499 Function Blocks; 8.1 IEC 61499 Basic Function Blocks; 8.2 Transformation; 8.2.1 Interface; 8.2.2 Algorithms; 8.2.3 Execution Control Chart; 8.3 Use and extension; 9 Conclusions and Outlook; A Appendix.…”
Full text (MFA users only)
Electronic eBook