Search Results - (((((((want OR canton) OR span) OR wanting) OR cantor) OR anne) OR carter) OR wansing) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 21
- Artificial intelligence 19
- Machine learning 19
- Data mining 15
- Mathematics 13
- artificial intelligence 11
- Mathematical models 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- methods 10
- Application software 9
- Computer networks 9
- Development 9
- Artificial Intelligence 8
- Algorithms 7
- Data Mining 7
- Graph theory 7
- Machine Learning 7
- R (Computer program language) 6
- algorithms 6
- Bioinformatics 5
- Computer security 5
- Computer simulation 5
- Electronic data processing 5
- History 5
- Neural Networks, Computer 5
- Social aspects 5
- Technological innovations 5
- Algebras, Linear 4
- Computational biology 4
Search alternatives:
-
161
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
162
-
163
-
164
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
165
Deep learning with Python : a hands-on introduction
Published 2017Full text (MFA users only)
Electronic eBook -
166
-
167
Robust and error-free geometric computing
Published 2020Full text (MFA users only)
Electronic eBook -
168
Handbook of industrial engineering equations, formulas, and calculations
Published 2011Table of Contents: “…Computational Foundations of Industrial Engineering ; Efficacy of Mathematical Modeling; Industrial Engineering and Computations; Definition and Applications; Orientation to STEM; IE Catchphrases; Span and Utility of IE; Heritage from Industrial Revolution; Historical Accounts; Chronology of Applications; Importance of Calculations Guide; Basic Queuing Equations; Queuing Birth-Death Processes; Laws of Motion of Queuing Birth and Death; Data Types for Computational Analysis; References; ; Basic Mathematical Calculations ; Quadratic Equation; Overall Mean; Chebyshev's Theorem; Permutations; Combinations; Probability Distribution; Probability; Distribution Function; Expected Value; Variance; Binomial Distribution; Poisson Distribution; Mean of a Binomial Distribution; Normal Distribution; Cumulative Distribution Function; Population Mean; Standard Error of the…”
Full text (MFA users only)
Electronic eBook -
169
Exploratory data analysis with MATLAB
Published 2017Table of Contents: “…5.5.2 Probabilistic Latent Semantic Analysis5.6 Minimum Spanning Trees and Clustering; 5.6.1 Definitions; 5.6.2 Minimum Spanning Tree Clustering; 5.7 Evaluating the Clusters; 5.7.1 Rand Index; 5.7.2 Cophenetic Correlation; 5.7.3 Upper Tail Rule; 5.7.4 Silhouette Plot; 5.7.5 Gap Statistic; 5.7.6 Cluster Validity Indices; 5.8 Summary and Further Reading; Exercises; Chapter 6 Model-Based Clustering; 6.1 Overview of Model-Based Clustering; 6.2 Finite Mixtures; 6.2.1 Multivariate Finite Mixtures; 6.2.2 Component Models -- Constraining the Covariances; 6.3 Expectation-Maximization Algorithm.…”
Full text (MFA users only)
Electronic eBook -
170
-
171
Learning OpenCV 3 Application Development.
Published 2016Full text (MFA users only)
Electronic eBook -
172
-
173
Destructive sublime : World War II in American film and media
Published 2018Full text (MFA users only)
Electronic eBook -
174
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook -
175
-
176
Deep Learning with TensorFlow : Explore neural networks and build intelligent systems with Python, 2nd Edition.
Published 2018Table of Contents: “…; Artificial neural networks; The biological neurons; The artificial neuron; How does an ANN learn?; ANNs and the backpropagation algorithm; Weight optimization; Stochastic gradient descent; Neural network architectures; Deep Neural Networks (DNNs); Multilayer perceptron; Deep Belief Networks (DBNs).…”
Full text (MFA users only)
Electronic eBook -
177
Dermatologic principles and practice in oncology : conditions of the skin, hair, and nails in cancer patients
Published 2013Table of Contents: “…Borovicka, Jennifer R.S. Gordon, Ann Cameron Haley, Nicole E. Larson and Dennis P. …”
Full text (MFA users only)
Electronic eBook -
178
Computational ecology : artificial neural networks and their applications
Published 2010Full text (MFA users only)
Electronic eBook -
179
Discovering knowledge in data : an introduction to data mining
Published 2014Table of Contents: “…DISCOVERING KNOWLEDGE IN DATA -- Contents -- Preface -- 1 An Introduction to Data Mining -- 1.1 What is Data Mining? -- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
Full text (MFA users only)
Electronic eBook -
180
IP multicast with applications to IPTV and mobile DVB-H
Published 2008Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
Full text (MFA users only)
Electronic eBook