Search Results - (((((((want OR kwantis) OR mantis) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 28
- Artificial intelligence 25
- Machine learning 25
- Data mining 17
- Mathematics 17
- Algorithms 15
- Mathematical models 14
- algorithms 14
- artificial intelligence 14
- Technological innovations 12
- Application software 11
- Computer networks 11
- Development 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Information technology 9
- methods 9
- Social aspects 8
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Mathematical optimization 6
- Parallel processing (Electronic computers) 6
- Wireless communication systems 6
- Bioinformatics 5
Search alternatives:
- kwantis »
- mantis »
- markant »
-
321
Language, vision, and music : selected papers from the 8th International Workshop on the Cognitive Science of Natural Language Processing, Galway, Ireland, 1999
Published 2002Full text (MFA users only)
Electronic Conference Proceeding eBook -
322
Politics of disinformation : the influence of fake news on the public sphere
Published 2021Full text (MFA users only)
Electronic eBook -
323
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
324
Big data analytics : turning big data into big money
Published 2013Full text (MFA users only)
Electronic eBook -
325
-
326
IBM TotalStorage : SAN product, design, and optimization guide
Published 2005Table of Contents: “…-- 1.1.2 The Internet brings increased risks -- 1.1.3 Planning for business continuity -- 1.2 Using a SAN for business continuance -- 1.2.1 SANs and business continuance -- 1.3 SAN business benefits -- 1.3.1 Storage consolidation and sharing of resources -- 1.3.2 Data sharing -- 1.3.3 Nondisruptive scalability for growth -- 1.3.4 Improved backup and recovery -- 1.3.5 High performance -- 1.3.6 High availability server clustering -- 1.3.7 Improved disaster tolerance -- 1.3.8 Allow selection of best of breed storage -- 1.3.9 Ease of data migration -- 1.3.10 Reduced total costs of ownership -- 1.3.11 Storage resources match e-business enterprise needs -- Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
327
Applied mechanics and manufacturing technology : selected, peer reviewed papers of the 2011 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2011),...
Published 2011Full text (MFA users only)
Electronic Conference Proceeding eBook -
328
Fuzzy Multiple Attribute Decision Making : Methods and Applications
Published 1992Full text (MFA users only)
Electronic eBook -
329
Technologies for sustainable development : proceedings of the 7th Nirma University International Conference on Engineering (NUiCONE 2019), November 21-22, 2019, Ahmedabad, India
Published 2020Full text (MFA users only)
Electronic Conference Proceeding eBook -
330
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
331
-
332
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
333
-
334
Machine learning and cognitive computing for mobile communications and wireless networks
Published 2020Table of Contents: “…KNN and SVM Models for Wireless 60 3.4.2 Bayesian Learning for Cognitive Radio 60 3.4.3 Deep Learning in Wireless Network 61 3.4.4 Deep Reinforcement Learning in Wireless Network 62 3.4.5 Traffic Engineering and Routing 63 3.4.6 Resource Sharing and Scheduling 64 3.4.7 Power Control and Data Collection 64 3.5 Conclusion 65 References 66 4 Cognitive Computing for Smart Communication 73; Poonam Sharma,…”
Full text (MFA users only)
Electronic eBook -
335
-
336
Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
337
Advances in intelligent transportation : system and technology : selected, peer reviewed papers from the 1st International Doctoral Annual Symposium on Intelligent Transportation T...
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
338
Information engineering for mechanics and materials research
Published 2013Full text (MFA users only)
Electronic Conference Proceeding eBook -
339
Mobile phones : technology, networks, and user issues
Published 2011Table of Contents: “…Seamless Sensor Fusion -- 4.1. Particle Filter Algorithm -- 4.2. Motion Model -- 4.3. Measurement Model -- 4.4. …”
Full text (MFA users only)
Electronic eBook -
340
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook