Search Results - (( ((chess computer) OR (threats computer)) ) OR (( hess OR ( less OR loss)) computer ))

Refine Results
  1. 1

    Emergent Computation A Festschrift for Selim G. Akl /

    Published 2017
    Table of Contents: “…All Twelve Prototypes Implement 1961 Lee algorithm -- Computer Chess Endgame Play with Pawns: Then and Now.- Community Detection Using Synthetic Coordinates and Flow Propagation.…”
    Full-text access
    View in OPAC
    e-Book
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /

    Published 2019
    Table of Contents: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
    Full-text access
    View in OPAC
    e-Book
  9. 9
  10. 10
  11. 11
  12. 12

    Computer and Network Security Essentials

    Published 2018
    Table of Contents: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
    Full-text access
    View in OPAC
    e-Book
  13. 13

    Soft Computing Applications

    Published 2018
    Table of Contents: “…A Brain like Computer Made of Time crystal: Could a Metric of Prime alone Replace a User and Alleviate Programming Forever? …”
    Full-text access
    View in OPAC
    e-Book
  14. 14
  15. 15

    Dense Image Correspondences for Computer Vision

    Published 2016
    Full-text access
    View in OPAC
    e-Book
  16. 16
  17. 17

    Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /

    Published 2018
    Table of Contents: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
    Full-text access
    View in OPAC
    e-Book
  18. 18
  19. 19

    Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 1 /

    Published 2018
    Table of Contents: “…Modified Critical-Path and Top-Level attributes (MCPTL) based Task Scheduling Algorithm in Parallel Computing -- Critical Path Problem for Scheduling using Genetic Algorithm -- A Robust Digital Image Watermarking Algorithm Using DWT and SVD -- A Novel and Secure Authentication Secret Key Generation Scheme Using Bilinear Self- Pairing Map Based on Elliptic Curve Cryptography -- Study and Comparatively Analysis of various Vulnerabilities occur in Google Chrome -- Secure Framework for Data Security in Cloud Computing -- An Improved Spider Monkey Optimization Algorithm -- Neural Network Based prediction of Productivity parameters -- Rigorous Data Analysis and Performance Evaluation of Indian Classical Raga Using RapidMiner -- EPQ Model with Product Stewardship Approach -- Loss and Cost Minimization with Enhancement of Voltage Profile of Distribution Systems Using a Modified Differential Evolution Technique -- Integration of GIS, Spatial Data Mining and Fuzzy Logic for Agricultural Intelligence -- Patient-specific Modeling for Pattern Identification in Clinical Events Using Data Mining Models and Evolutionary Computing -- Teaching Learning Based Optimization on Hadoop -- Analysis and Parameter Estimation of Micro Strip Circular Patch Antennas Using Artificial Neural Networks -- Vibrational Frequencies of Parallelogram Plate with Circular Variations in Thickness -- Study and Comparative Analysis of Various Image Spamming Techniques -- On Comparing Performance of Conventional Fuzzy System with Recurrent Fuzzy System -- Application of PSO Clustering for Selection of Chemical Interface Materials for Sensor Array Electronic Nose -- Panorama Generation using Feature based Mosaicing and Modified Graph-cut Blending -- Application of fuzzy multi-criteria approach to assess the water quality of river Ganges -- Efficient multiprocessor scheduling Using Water Cycle Algorithm.…”
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Secure System Design and Trustable Computing

    Published 2016
    Full-text access
    View in OPAC
    e-Book