Search Results - (((((((want OR antii) OR semantic) OR mind) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 481

    SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention. by Almalawi, Abdulmohsen

    Published 2020
    Table of Contents: “…CHAPTER 4 Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- 4.1 INTRODUCTION -- 4.2 RELATED WORK -- 4.3 THE kNNVWC APPROACH -- 4.3.1 FWC Algorithm and Its Limitations -- 4.3.2 Various-Widths Clustering -- 4.3.3 The k-NN Search -- 4.4 EXPERIMENTAL EVALUATION -- 4.4.1 Data Sets -- 4.4.2 Performance Metrics -- 4.4.3 Impact of Cluster Size -- 4.4.4 Baseline Methods -- 4.4.5 Distance Metric -- 4.4.6 Complexity Metrics -- 4.5 CONCLUSION -- CHAPTER 5 SCADA Data-Driven Anomaly Detection -- 5.1 INTRODUCTION -- 5.2 SDAD APPROACH -- 5.2.1 Observation State of SCADA Points…”
    Full text (MFA users only)
    Electronic eBook
  2. 482

    Anesthesia student survival guide : a case-based approach

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  3. 483

    Reproducibility : principles, problems, practices, and prospects

    Published 2016
    Table of Contents: “…6.3 Extending BMS (and NML#): BMS* -- 6.4 Replication Variance and Reproducibility -- 6.4.1 Within- and Between-Setting Replication Variance and the True State of the World -- 6.4.2 Reproducibility -- 6.4.3 A Toy Example -- 6.5 Final Remark -- References -- Chapter 7 Reproducibility from the Perspective of Meta-Analysis -- 7.1 Introduction -- 7.2 Basics of Meta-Analysis -- 7.2.1 Conceptual Preliminaries -- 7.2.2 Systematic Reviews -- 7.2.3 Fixed-Effects and Random-Effects Meta-Analysis -- 7.2.4 Biases in Meta-Analysis -- 7.3 Meta-Analysis of Mind-Matter Experiments: A Case Study -- 7.3.1 Statistical Modeling -- 7.3.2 Analysis of the Ramp -- N Data -- 7.4 Summary -- References -- Chapter 8 Why Are There So Many Clustering Algorithms, and How Valid Are Their Results? …”
    Full text (MFA users only)
    Electronic eBook
  4. 484
  5. 485

    Politics of disinformation : the influence of fake news on the public sphere

    Published 2021
    Full text (MFA users only)
    Electronic eBook
  6. 486

    XML for DB2 information integration

    Published 2004
    Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  7. 487

    Big data analytics : turning big data into big money by Ohlhorst, Frank, 1964-

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  8. 488

    AI and the future of banking by Boobier, Tony, 1956-

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  9. 489

    IBM TotalStorage : SAN product, design, and optimization guide

    Published 2005
    Table of Contents: “…-- 1.1.2 The Internet brings increased risks -- 1.1.3 Planning for business continuity -- 1.2 Using a SAN for business continuance -- 1.2.1 SANs and business continuance -- 1.3 SAN business benefits -- 1.3.1 Storage consolidation and sharing of resources -- 1.3.2 Data sharing -- 1.3.3 Nondisruptive scalability for growth -- 1.3.4 Improved backup and recovery -- 1.3.5 High performance -- 1.3.6 High availability server clustering -- 1.3.7 Improved disaster tolerance -- 1.3.8 Allow selection of best of breed storage -- 1.3.9 Ease of data migration -- 1.3.10 Reduced total costs of ownership -- 1.3.11 Storage resources match e-business enterprise needs -- Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  10. 490
  11. 491

    Fuzzy Multiple Attribute Decision Making : Methods and Applications by Chen, Shu-Jen

    Published 1992
    Full text (MFA users only)
    Electronic eBook
  12. 492
  13. 493

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  14. 494

    Network Performance Analysis. by Bonald, Thomas

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  15. 495

    Machine learning and cognitive computing for mobile communications and wireless networks

    Published 2020
    Table of Contents: “…KNN and SVM Models for Wireless 60 3.4.2 Bayesian Learning for Cognitive Radio 60 3.4.3 Deep Learning in Wireless Network 61 3.4.4 Deep Reinforcement Learning in Wireless Network 62 3.4.5 Traffic Engineering and Routing 63 3.4.6 Resource Sharing and Scheduling 64 3.4.7 Power Control and Data Collection 64 3.5 Conclusion 65 References 66 4 Cognitive Computing for Smart Communication 73; Poonam Sharma,…”
    Full text (MFA users only)
    Electronic eBook
  16. 496

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  17. 497
  18. 498
  19. 499

    Information engineering for mechanics and materials research

    Published 2013
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 500

    Mobile phones : technology, networks, and user issues

    Published 2011
    Table of Contents: “…Seamless Sensor Fusion -- 4.1. Particle Filter Algorithm -- 4.2. Motion Model -- 4.3. Measurement Model -- 4.4. …”
    Full text (MFA users only)
    Electronic eBook