Search Results - (((((((want OR mantis) OR semantic) OR kind) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 46
- Artificial intelligence 39
- Mathematics 36
- Mathematical models 32
- Machine learning 31
- Algorithms 23
- Data mining 23
- algorithms 20
- artificial intelligence 17
- Computer networks 16
- Computer science 16
- Data Mining 13
- Neural networks (Computer science) 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Computer algorithms 12
- Information technology 12
- Technological innovations 12
- methods 12
- Electronic data processing 11
- Image processing 11
- Social aspects 11
- Computer simulation 10
- Automatic control 9
- Big data 9
- Computer security 9
- Digital techniques 9
- Machine Learning 9
- Management 9
- Application software 8
Search alternatives:
-
181
Enterprise artificial intelligence transformation : a playbook for the next generation of business and technology leaders
Published 2020Table of Contents: “…Types of Uses for Machine Learning -- Types of Machine Learning Algorithms -- Supervised, Unsupervised, and Semisupervised Learning -- Making Data More Useful -- Semantic Reasoning -- Applications of AI -- PART II Artificial Intelligence in the Enterprise -- Chapter 3 AI in E-Commerce and Retail -- Digital Advertising -- Marketing and Customer Acquisition -- Cross-Selling, Up-Selling, and Loyalty -- Business-to-Business Customer Intelligence -- Dynamic Pricing and Supply Chain Optimization -- Digital Assistants and Customer Engagement -- Chapter 4 AI in Financial Services -- Anti-Money Laundering.…”
Full text (MFA users only)
Electronic eBook -
182
Battery management systems. Volume I, Battery modeling
Published 2015Full text (MFA users only)
Electronic eBook -
183
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
184
-
185
Fast sequential Monte Carlo methods for counting and optimization
Published 2013Full text (MFA users only)
Electronic eBook -
186
Direct Eigen Control for Induction Machines and Synchronous Motors.
Published 2012Full text (MFA users only)
Electronic eBook -
187
CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).
Published 2018Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
Full text (MFA users only)
Electronic eBook -
188
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
189
Generative design
Published 2015Table of Contents: “…Intro; 1.0 Introduction to Generative Design; 2.0 Continuous Surfaces; 3.0 Modularity and Accumulation; 4.0 Deformation and Subtraction; 5.0 Algorithmic Patterns; 6.0 Triangulation ; 7.0 Conclusion: The Digital Vs Physical Debate ; Bibliography ; Index; Picture Credits; Acknowledgements; 1.1 Design methods in architecture: A brief review; 1.2 Generative form-finding processes; 1.3 The approach of this book; 2.1 Soft mesh; 2.2 Double-curved shells; 2.3 Hyper paraboloids; 3.1 Interlocking units; 3.2 Irregular units; 4.1 Twisted block; 4.2 Porous space; 5.1 Tessellated planes…”
Full text (MFA users only)
Electronic eBook -
190
Inverse problems of vibrational spectroscopy
Published 1999Table of Contents: “…Angle between a bond and the plane of an atomic triple -- 4.3.5. Angle between two planes (torsion coordinate) -- 4.3.6. …”
Full text (MFA users only)
Electronic eBook -
191
-
192
Rediscovering mathematics : you do the math
Published 2011Full text (MFA users only)
Electronic eBook -
193
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
194
-
195
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
196
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
197
Advances in structures analysis : special topic volume with invited peer reviewed papers only
Published 2011Full text (MFA users only)
Electronic eBook -
198
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
199
Handbook on semidefinite, conic and polynomial optimization
Published 2012Table of Contents: “…Lasserre and Mihai Putinar -- Self-regular interior-point methods for semidefinite optimization / Maziar Salahi and Tamás Terlaky -- Elementary optimality conditions for nonlinear SDPs / Florian Jarre -- Recent progress in interior-point methods: cutting-plane algorithms and warm starts / Alexander Engau -- Exploiting sparsity in SDP relaxation of polynomial optimization problems / Sunyoung Kim and Masakazu Kojima -- Block coordinate descent methods for semidefinite programming / Zaiwen Wen, Donald Goldfarb, and Katya Scheinberg -- Projection methods in conic optimization / Didier Henrion and Jérôme Malick -- SDP relaxations for non-commutative polynomial optimization / Miguel Navascués, Stefano Pironio, and Antonio Acín -- Semidefinite programming and constraint programming / Willem-Jan van Hoeve -- The state-of-the-art in conic optimization software / Hans D. …”
Full text (MFA users only)
Electronic eBook -
200
Digital Signal Processing and Applications with the OMAP - L138 EXperimenter.
Published 2012Table of Contents: “…5.2 Development of the FFT Algorithm with Radix-2 -- 5.3 Decimation-In-Frequency FFT Algorithm with Radix-2 -- 5.4 Decimation-In-Time FFT Algorithm with RADIX-2 -- 5.4.1 Reordered Sequences in the Radix-2 FFT and Bit-Reversed Addressing -- 5.5 Decimation-In-Frequency FFT Algorithm with Radix-4 -- 5.6 Inverse Fast Fourier Transform -- 5.7 Programming Examples Using C Code -- 5.7.1 Frame- or Block-Based Processing -- 5.7.2 Fast Convolution -- References -- 6. …”
Full text (MFA users only)
Electronic eBook