Search Results - (((((((want OR anti) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

Search alternatives:

  1. 141

    Sentient Enterprise The Evolution of Business Decision-making.

    Published 2017
    Table of Contents: “…More "Data Listening"; Setup for Sentience; Chapter 7 The Autonomous Decisioning Platform; Fast-Changing Capabilities; Self-Driving Cars ... and Companies; "System of Systems" Building Blocks for Sentience; Algorithms: A Must-Have for Autonomous Decisioning; Strategically Applying Algorithmic Intelligence in the Enterprise; Algorithmic "Magic."…”
    Full text (MFA users only)
    Electronic eBook
  2. 142

    Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals by Burkhardt, Joanna M.

    Published 2022
    Table of Contents: “…Expertise, Authority and Credibility -- Experts -- Sharing information -- Evaluating information -- Authority -- How can authority be evaluated? …”
    Full text (MFA users only)
    Electronic eBook
  3. 143

    Artificial Intelligence in Semiconductor Industry - Materials to Applications. by Wee, Hui-Ming

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
    Full text (MFA users only)
    Electronic eBook
  4. 144

    Machine Learning for Mobile : Practical Guide to Building Intelligent Mobile Applications Powered by Machine Learning. by Gopalakrishnan, Revathi

    Published 2018
    Table of Contents: “…Chapter 2: Supervised and Unsupervised Learning AlgorithmsIntroduction to supervised learning algorithms; Deep dive into supervised learning algorithms; Naive Bayes; Decision trees; Linear regression; Logistic regression; Support vector machines; Random forest; Introduction to unsupervised learning algorithms; Deep dive into unsupervised learning algorithms; Clustering algorithms; Clustering methods; Hierarchical agglomerative clustering methods; K-means clustering; Association rule learning algorithm; Summary; References; Chapter 3: Random Forest on iOS; Introduction to algorithms…”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Can markets compute equilibria? by Monroe, Hunter K.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  7. 147
  8. 148
  9. 149
  10. 150

    Urodynamics : a quick pocket guide by Vignoli, Giancarlo

    Published 2016
    Table of Contents: “…The framework of basic science -- Key symptoms analysis and diagnostic algorithms -- Physical examination and laboratory evaluation -- Urodynamic testing: when and which -- Voiding diary and Pad testing -- Non-invasive urodynamics -- Conventional urodynamics-conventional urodynamics in pediatric age -- Electromyogtrahy -- Urethral profilometry -- Videourodynamics -- Ambulatory urodynamics -- Urodynamics of upper urinary tract.…”
    Full text (MFA users only)
    Electronic eBook
  11. 151

    Mount Sinai expert guides. Hepatology

    Published 2014
    Table of Contents: “…Cover; Title page; Copyright page; Contents; List of Contributors; Series Foreword; Preface; Abbreviation List; About the Companion Website; PART 1: Hepatology; CHAPTER 1: Approach to the Patient with Abnormal Liver Tests; Section 1: Background; Definition of disease; Disease classification; Etiology; Pathology/pathogenesis; Section 2: Prevention; Section 3: Diagnosis; Typical presentation; Clinical diagnosis; Laboratory diagnosis; Diagnostic algorithm; Potential pitfalls/common errors made regarding diagnosis of disease; Section 4: Treatment; When to hospitalize…”
    Full text (MFA users only)
    Electronic eBook
  12. 152

    Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management. by Gabrijelčič, Primož

    Published 2018
    Table of Contents: “…Dynamic record allocationFastMM internals; Memory allocation in a parallel world; Replacing the default memory manager; ScaleMM; TBBMalloc; Fine-tuning SlowCode; Summary; Chapter 5: Getting Started with the Parallel World; Processes and threads; When to parallelize the code?; Most common problems; Never access UI from a background thread; Simultaneous reading and writing; Sharing a variable; Synchronization; Critical sections; Other locking mechanisms; A short note on coding style; Shared data with built-in locking; Interlocked operations; Object life cycle; Communication; Windows messages.…”
    Full text (MFA users only)
    Electronic eBook
  13. 153

    Building Machine Learning Systems with Python. by Richert, Willi

    Published 2013
    Table of Contents: “…Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Python Machine Learning; Machine learning and Python -- the dream team; What the book will teach you (and what it will not); What to do when you are stuck; Getting started; Introduction to NumPy, SciPy, and Matplotlib; Installing Python; Chewing data efficiently with NumPy and intelligently with SciPy; Learning NumPy; Indexing; Handling non-existing values; Comparing runtime behaviors; Learning SciPy; Our first (tiny) machine learning application.…”
    Full text (MFA users only)
    Electronic eBook
  14. 154

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  15. 155

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  16. 156

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  17. 157

    Database technology for life sciences and medicine

    Published 2010
    Table of Contents: “…Document authoring and searching. 3.5. Sharing distributed biomedical data. 3.6. The architecture of SciPort. 3.7. …”
    Full text (MFA users only)
    Electronic eBook
  18. 158

    Blockchain-based peer-to-peer transactions in energy systems by Nwulu, Nnamdi, Damisa, Uyikumhe

    Published 2023
    Table of Contents: “…Smart contract-based peer-to-peer energy storage-sharing architecture and algorithm -- 8.3. Smart contract functions for the storage-sharing scheme -- 8.4. …”
    Full text (MFA users only)
    Electronic eBook
  19. 159

    Multi-label dimensionality reduction by Liang Sun

    Published 2014
    Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Elements of quantum computation and quantum communication by Pathak, Anirban

    Published 2013
    Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
    Full text (MFA users only)
    Electronic eBook