Search Results - (((((((want OR kwantis) OR wants) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 241

    Dermatologic principles and practice in oncology : conditions of the skin, hair, and nails in cancer patients

    Published 2013
    Table of Contents: “…Borovicka, Jennifer R.S. Gordon, Ann Cameron Haley, Nicole E. Larson and Dennis P. …”
    Full text (MFA users only)
    Electronic eBook
  2. 242
  3. 243

    The New Advertising : Branding, Content, and Consumer Relationships in the Data-Driven Social Media Era. by Wang, Ming

    Published 2016
    Table of Contents: “…Persuasive Avatars: Extending the Self through New Media AdvertisingPart III: Algorithms, Analytics, and Concerns ; 10. Road of Discovery: The Intricacies of Search Marketing; 11. …”
    Full text (MFA users only)
    Electronic eBook
  4. 244

    Discovering knowledge in data : an introduction to data mining by Larose, Daniel T.

    Published 2014
    Table of Contents: “…DISCOVERING KNOWLEDGE IN DATA -- Contents -- Preface -- 1 An Introduction to Data Mining -- 1.1 What is Data Mining? -- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
    Full text (MFA users only)
    Electronic eBook
  5. 245
  6. 246

    IP multicast with applications to IPTV and mobile DVB-H by Minoli, Daniel, 1952-

    Published 2008
    Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
    Full text (MFA users only)
    Electronic eBook
  7. 247

    PHealth 2017 : proceedings of the 14th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 14-16 May 2017, Eindhoven, the Netherlands

    Published 2017
    Table of Contents: “…Information System of Personalized Patient's Adherence Level DeterminationSmartphones to Access to Patient Data in Hospital Settings: Authentication Solutions for Shared Devices; pHealth and Population Health; Architecture for Variable Data Entry into a National Registry; Patient Summaries in Context of Large Scale EHR Networks with Fine Granular Access Control Restrictions; Behavioral Aspects; Classifying Drivers' Cognitive Load Using EEG Signals; Open Dataset for the Automatic Recognition of Sedentary Behaviors.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 248

    QoS and Energy Management in Cognitive Radio Network : Case Study Approach. by Mishra, Vishram

    Published 2016
    Table of Contents: “…; 1.2 Spectrum Regulation; 1.2.1 Licensed Spectrum; 1.2.2 Unlicensed Spectrum; 1.2.3 Open Spectrum; 1.3 Opportunistic Spectrum Usage; 1.4 Software Defined Radio and Cognitive Radio; 1.4.1 IEEE Groups Working on Spectrum Sharing; 1.4.2 Cognition Cycle; 1.4.3 Cognitive Engine and Framework; 1.4.4 Cognitive Radio Network; 1.5 Quality of Service (QoS); 1.5.1 QoS Provisioning for Latency Guarantee; 1.5.2 QoS Provisioning for Throughput Guarantee; 1.6 Channel Selection Techniques in Cognitive Radio Network.…”
    Full text (MFA users only)
    Electronic eBook
  9. 249

    CUDA Application Design and Development. by Farber, Rob

    Published 2011
    Table of Contents: “…The Nsight Timeline Analysis -- The NVTX Tracing Library -- Scaling Behavior of the CUDA API -- Tuning and Analysis Utilities (TAU) -- Summary -- 4 The CUDA Execution Model -- GPU Architecture Overview -- Thread Scheduling: Orchestrating Performance and Parallelism via the Execution Configuration -- Relevant computeprof Values for a Warp -- Warp Divergence -- Guidelines for Warp Divergence -- Relevant computeprof Values for Warp Divergence -- Warp Scheduling and TLP -- Relevant computeprof Values for Occupancy -- ILP: Higher Performance at Lower Occupancy -- ILP Hides Arithmetic Latency -- ILP Hides Data Latency -- ILP in the Future -- Relevant computeprof Values for Instruction Rates -- Little's Law -- CUDA Tools to Identify Limiting Factors -- The nvcc Compiler -- Launch Bounds -- The Disassembler -- PTX Kernels -- GPU Emulators -- Summary -- 5 CUDA Memory -- The CUDA Memory Hierarchy -- GPU Memory -- L2 Cache -- Relevant computeprof Values for the L2 Cache -- L1 Cache -- Relevant computeprof Values for the L1 Cache -- CUDA Memory Types -- Registers -- Local memory -- Relevant computeprof Values for Local Memory Cache -- Shared Memory -- Relevant computeprof Values for Shared Memory -- Constant Memory -- Texture Memory -- Relevant computeprof Values for Texture Memory -- Global Memory -- Common Coalescing Use Cases -- Allocation of Global Memory -- Limiting Factors in the Design of Global Memory -- Relevant computeprof Values for Global Memory -- Summary -- 6 Efficiently Using GPU Memory -- Reduction -- The Reduction Template -- A Test Program for functionReduce.h -- Results -- Utilizing Irregular Data Structures -- Sparse Matrices and the CUSP Library -- Graph Algorithms -- SoA, AoS, and Other Structures -- Tiles and Stencils -- Summary -- 7 Techniques to Increase Parallelism -- CUDA Contexts Extend Parallelism -- Streams and Contexts.…”
    Full text (MFA users only)
    Electronic eBook
  10. 250

    Principles of artificial neural networks by Graupe, Daniel

    Published 2013
    Table of Contents: “…Fundamentals of biological neural networks -- ch. 3. Basic principles of ANNs and their early structures. 3.1. Basic principles of ANN design. 3.2. …”
    Full text (MFA users only)
    Electronic eBook
  11. 251

    Artificial intelligence in society.

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  12. 252

    Advanced Python Programming : Build High Performance, Concurrent, and Multi-Threaded Apps with Python Using Proven Design Patterns. by Lanaro, Gabriele

    Published 2019
    Table of Contents: “…Cover; Title Page; Copyright; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Benchmarking and Profiling; Designing your application; Writing tests and benchmarks; Timing your benchmark; Better tests and benchmarks with pytest-benchmark; Finding bottlenecks with cProfile; Profile line by line with line_profiler; Optimizing our code; The dis module; Profiling memory usage with memory_profiler; Summary; Chapter 2: Pure Python Optimizations; Useful algorithms and data structures; Lists and deques; Dictionaries; Building an in-memory search index using a hash map; Sets; Heaps…”
    Full text (MFA users only)
    Electronic eBook
  13. 253

    Haptic Feedback Teleoperation of Optical Tweezers by Ni, Zhenjiang

    Published 2014
    Table of Contents: “…Specific designs for haptic interactions; 1.4.1. Temporal sharing; 1.4.2. Spatial sharing; 1.5. Discussion; 1.6. …”
    Full text (MFA users only)
    Electronic eBook
  14. 254

    Machine Learning with Spark - Second Edition. by Dua, Rajdeep

    Published 2016
    Table of Contents: “…Generating predictions for the Kaggle/StumbleUpon evergreen classification dataset -- Evaluating the performance of classification models -- Accuracy and prediction error -- Precision and recall -- ROC curve and AUC -- Improving model performance and tuning parameters -- Feature standardization -- Additional features -- Using the correct form of data -- Tuning model parameters -- Linear models -- Iterations -- Step size -- Regularization -- Decision trees -- Tuning tree depth and impurity -- The naive Bayes model -- Cross-validation -- Summary -- Chapter 7: Building a Regression Model with Spark -- Types of regression models -- Least squares regression -- Decision trees for regression -- Evaluating the performance of regression models -- Mean Squared Error and Root Mean Squared Error -- Mean Absolute Error -- Root Mean Squared Log Error -- The R-squared coefficient -- Extracting the right features from your data -- Extracting features from the bike sharing dataset -- Training and using regression models -- BikeSharingExecutor -- Training a regression model on the bike sharing dataset -- Linear regression -- Generalized linear regression -- Decision tree regression -- Ensembles of trees -- Random forest regression -- Gradient boosted tree regression -- Improving model performance and tuning parameters -- Transforming the target variable -- Impact of training on log-transformed targets -- Tuning model parameters -- Creating training and testing sets to evaluate parameters -- Splitting data for Decision tree -- The impact of parameter settings for linear models -- Iterations -- Step size -- L2 regularization -- L1 regularization -- Intercept -- The impact of parameter settings for the decision tree -- Tree depth -- Maximum bins -- The impact of parameter settings for the Gradient Boosted Trees -- Iterations -- MaxBins -- Summary.…”
    Full text (MFA users only)
    Electronic eBook
  15. 255
  16. 256
  17. 257
  18. 258

    AI and human thought and emotion by Freed, Sam (Philosophy professor)

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  19. 259

    Cinder Creative Coding Cookbook. by Dawid Gorny, Rui Madeira

    Published 2013
    Table of Contents: “…Creating a simple video controllerSaving window content as an image; Saving window animations as video; Saving window content as a vector graphics image; Saving high resolution images with the tile renderer; Sharing graphics between applications; Building Particle Systems; Introduction; Creating a particle system in 2D; Applying repulsion and attraction forces; Simulating particles flying in the wind; Simulating flocking behavior; Making our particles sound reactive; Aligning particles to a processed image; Aligning particles to the mesh surface; Creating springs.…”
    Full text (MFA users only)
    Electronic eBook
  20. 260

    Frontiers of Artificial Intelligence in Medical Imaging. by Razmjooy, Navid

    Published 2023
    Table of Contents: “…5.5 Electromagnetic field optimization algorithm -- 5.6 Developed electromagnetic field optimization algorithm -- 5.7 Simulation results -- 5.7.1 Image acquisition -- 5.7.2 Pre-processing stage -- 5.7.3 Processing stage -- 5.7.4 Classification -- 5.8 Final evaluation -- 5.9 Conclusions -- References -- Chapter 6 Evaluation of COVID-19 lesion from CT scan slices: a study using entropy-based thresholding and DRLS segmentation -- 6.1 Introduction -- 6.2 Context -- 6.3 Methodology -- 6.3.1 COVID-19 database -- 6.3.2 Image conversion and pre-processing -- 6.3.3 Image thresholding…”
    Full text (MFA users only)
    Electronic eBook