Listing 1 - 10 of 153 << page
of 16
>>
Sort by
Handbook of applied algorithms : solving scientific, engineering and practical problems
Authors: ---
ISBN: 1281284378 9786611284374 0470175664 0470175648 9780470175668 9780470044926 Year: 2008 Publisher: Hoboken, New Jersey : [Piscataqay, New Jersey] : Wiley-Interscience, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discover the benefits of applying algorithms to solve scientific, engineering, and practical problems Providing a combination of theory, algorithms, and simulations, Handbook of Applied Algorithms presents an all-encompassing treatment of applying algorithms and discrete mathematics to practical problems in "hot" application areas, such as computational biology, computational chemistry, wireless networks, and computer vision. In eighteen self-contained chapters, this timely book explores: * Localized algorithms that can be used in topology control for wireless ad-hoc or sensor networks * Bioinformatics algorithms for analyzing data * Clustering algorithms and identification of association rules in data mining * Applications of combinatorial algorithms and graph theory in chemistry and molecular biology * Optimizing the frequency planning of a GSM network using evolutionary algorithms * Algorithmic solutions and advances achieved through game theory Complete with exercises for readers to measure their comprehension of the material presented, Handbook of Applied Algorithms is a much-needed resource for researchers, practitioners, and students within computer science, life science, and engineering. Amiya Nayak, PhD, has over seventeen years of industrial experience and is Full Professor at the School of Information Technology and Engineering at the University of Ottawa, Canada. He is on the editorial board of several journals. Dr. Nayak's research interests are in the areas of fault tolerance, distributed systems/algorithms, and mobile ad-hoc networks. Ivan StojmenoviC?, PhD, is Professor at the University of Ottawa, Canada (www.site.uottawa.ca/~ivan), and Chair Professor of Applied Computing at the University of Birmingham, United Kingdom. Dr. Stojmenovic? received the Royal Society Wolfson Research Merit Award. His current research interests are mostly in the design and analysis of algorithms for wireless ad-hoc and sensor networks.


Book
Algorithmic Aspects in Information and Management
Authors: --- ---
ISBN: 9783031160813 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of 7th International Conference on Harmony Search, Soft Computing and Applications
Authors: --- --- --- --- --- et al.
ISBN: 9789811929489 Year: 2022 Publisher: Singapore Springer Nature Singapore :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book covers different aspects of real-world applications of optimization algorithms. It provides insights from the Seventh International Conference on Harmony Search, Soft Computing and Applications held at Virtual Conference, Seoul, South Korea, in February 2022. Harmony search (HS) is one of the most popular metaheuristic algorithms, developed in 2001 by Prof. Joong Hoon Kim and Prof. Zong Woo Geem, that mimics the improvisation process of jazz musicians to seek the best harmony. The book consists of research articles on novel and newly proposed optimization algorithms; the theoretical study of nature-inspired optimization algorithms; numerically established results of nature-inspired optimization algorithms; and real-world applications of optimization algorithms and synthetic benchmarking of optimization algorithms


Book
Algorithms unlocked
Author:
ISBN: 9780262518802 9780262313223 0262313227 9780262313230 0262313235 9781299284272 1299284272 0262518805 Year: 2013 Publisher: Cambridge, Massachusetts : [Piscataqay, New Jersey] : The MIT Press, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves into your GPS, your laptop, or your smart phone? This book offers an engagingly written guide to the basics of computer algorithms. In Algorithms Unlocked, Thomas Cormen -- coauthor of the leading college textbook on the subject -- provides a general explanation, with limited mathematics, of how algorithms enable computers to solve problems. Readers will learn what computer algorithms are, how to describe them, and how to evaluate them. They will discover simple ways to search for information in a computer; methods for rearranging information in a computer into a prescribed order ("sorting"); how to solve basic problems that can be modeled in a computer with a mathematical structure called a "graph" (useful for modeling road networks, dependencies among tasks, and financial relationships); how to solve problems that ask questions about strings of characters such as DNA structures; the basic principles behind cryptography; fundamentals of data compression; and even that there are some problems that no one has figured out how to solve on a computer in a reasonable amount of time.


Book
From digital traces to algorithmic projections
Authors: ---
ISBN: 0081023693 178548270X 9780081023693 9781785482700 Year: 2018 Publisher: London, England : ISTE Press : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Algorithms : design techniques and analysis
Author:
ISBN: 128186997X 9786611869977 9812386394 9789812386397 9789810237400 9810237405 6611869972 Year: 1999 Volume: v. 7 Publisher: Singapore : World Scientific,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Problem solving is an essential part of every scientific discipline. It has two components: (1) problem identification and formulation, and (2) solution of the formulated problem. One can solve a problem on its own using ad hoc techniques or follow those techniques that have produced efficient solutions to similar problems. This requires the understanding of various algorithm design techniques, how and when to use them to formulate solutions and the context appropriate for each of them. This book advocates the study of algorithm design techniques by presenting most of the useful algorithm design techniques and illustrating them through numerous examples.


Book
Essential maths skills for AS/A- level computer science
Authors: ---
ISBN: 1471863581 9781471863578 1471863573 9781471863585 Year: 2016 Publisher: Banbury, Oxfordshire

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Fundamentals of optimization techniques with algorithms
Author:
ISBN: 0128224924 0128211261 9780128224922 9780128211267 Year: 2020 Publisher: Waltham, Massachusetts : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Probabilistic numerics
Authors: --- ---
ISBN: 9781316681411 9781107163447 1107163447 Year: 2022 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Probabilistic numerical computation formalises the connection between machine learning and applied mathematics. Numerical algorithms approximate intractable quantities from computable ones. They estimate integrals from evaluations of the integrand, or the path of a dynamical system described by differential equations from evaluations of the vector field. In other words, they infer a latent quantity from data. This book shows that it is thus formally possible to think of computational routines as learning machines, and to use the notion of Bayesian inference to build more flexible, efficient, or customised algorithms for computation. The text caters for Masters' and PhD students, as well as postgraduate researchers in artificial intelligence, computer science, statistics, and applied mathematics. Extensive background material is provided along with a wealth of figures, worked examples, and exercises (with solutions) to develop intuition.


Book
Machine learning for cybersecurity cookbook : over 80 recipes on how to implement machine learning algorithms for building security systems using python
Author:
ISBN: 1838556346 9781838556341 1789614678 9781789614671 Year: 2019 Publisher: Birmingham ; Mumbai : Packt Publishing, Limited,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Learn how to apply modern AI to create powerful cybersecurity solutions for malware, pentesting, social engineering, data privacy, and intrusion detection Key Features Manage data of varying complexity to protect your system using the Python ecosystem Apply ML to pentesting, malware, data privacy, intrusion detection system(IDS) and social engineering Automate your daily workflow by addressing various security challenges using the recipes covered in the book Book Description Organizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference. With this book, you'll learn how to use Python libraries such as TensorFlow and scikit-learn to implement the latest artificial intelligence (AI) techniques and handle challenges faced by cybersecurity researchers. You'll begin by exploring various machine learning (ML) techniques and tips for setting up a secure lab environment. Next, you'll implement key ML algorithms such as clustering, gradient boosting, random forest, and XGBoost. The book will guide you through constructing classifiers and features for malware, which you'll train and test on real samples. As you progress, you'll build self-learning, reliant systems to handle cybersecurity tasks such as identifying malicious URLs, spam email detection, intrusion detection, network protection, and tracking user and process behavior. Later, you'll apply generative adversarial networks (GANs) and autoencoders to advanced security tasks. Finally, you'll delve into secure and private AI to protect the privacy rights of consumers using your ML models. By the end of this book, you'll have the skills you need to tackle real-world problems faced in the cybersecurity domain using a recipe-based approach. What you will learn Learn how to build malware classifiers to detect suspicious activities Apply ML to generate custom malware to pentest your security Use ML algorithms with complex datasets to implement cybersecurity concepts Create neural networks to identify fake videos and images Secure your organization from one of the most popular threats - insider threats Defend against zero-day threats by constructing an anomaly detection system Detect web vulnerabilities effectively by combining Metasploit and ML Understand how to train a model without exposing the training data Who this book is for This book is for cybersecurity professionals and security researchers who are looking to implement the latest machine learning techniques to boost computer security, and gain insights into securing an organization using red and blue team ML. This recipe-based book will also be useful for data scientists and machine learning developers who want to experiment with smart techniques in the cybersecurity domain. Working knowledge of Python programming and familiarity with cybersecurity fundamentals will help you get the most out of this book." -- Publisher's description.

Listing 1 - 10 of 153 << page
of 16
>>
Sort by