• ...in Prim's algorithm, the graph must be connected. Different structure and data cause different approach to application. These three algorithms can be used
    10 KB (1,524 words) - 23:36, 24 April 2016
  • Network theory is the study of graphs. Social network examines the structure of relationships between social entities like groups, websites or nation st ...the other hand, government agencies and marketers are collecting personal data about us. Katz and Rice (2002) describe the Internet as a panopticon, which
    14 KB (2,465 words) - 20:07, 24 April 2016
  • ...s neural networks, image processing, data mining, sensor networks, protein structure, and many types of engineering. In Karaboga’s original paper, he used the ...g applications in fields such as neural networks, software engineering and data mining. If you are interested in any of these fields, you should consider s
    14 KB (2,177 words) - 11:28, 24 April 2016
  • ..., network routing, the algorithm can be used to find the shortest path for data packets to take in a switching network. Another common use of Dijkstra algo ...mple, may be slightly modified or substituted completely with another data structure like list), and finally Relaxation and Distance Initialization (method of e
    14 KB (2,351 words) - 23:21, 24 April 2016
  • ...ture. Edge detection is every now and again the initial phase in recouping data from pictures. Because of its significance, edge detection keeps on being a
    3 KB (498 words) - 18:53, 30 November 2016
  • ...out-of-order processors pipelines, there are many "pipeline loops" due to data/information generated in later pipeline stages and used in earlier stages ( ...to stall if a miss can't be serviced. (Think structural hazard instead of data hazard.) Thus, the only thing stalling the pipeline in this case is the ban
    20 KB (3,337 words) - 15:32, 25 April 2017
  • ...arkov Model.” ResearchGate, Jan. 2006, www.researchgate.net/figure/Basic-structure-of-a-Hidden-Markov-Model_fig2_24115579. .... “Markov Chain Analysis and Simulation Using Python.” Medium, Towards Data Science, 23 Nov. 2019, towardsdatascience.com/markov-chain-analysis-and-sim
    2 KB (254 words) - 14:08, 6 December 2020
  • ...one another. The frequentist approach to making conclusions from the given data requires that the correct conclusion can be formulated with a high probabil ...t estimate, suggest its value and test whether the value lines up with the data, or derive a confidence interval (a defined range of values with a specifie
    2 KB (321 words) - 22:24, 6 December 2020
  • | [[Swanson_MA279_Fall2022_topic5|Symmetries in crystal structure]] | [[Swanson_MA279_Fall2022_topic6|Data anonymization]]
    4 KB (518 words) - 13:15, 4 December 2022
  • In the age of the internet, data transmission is everything. It allows us to do things as simple as messagin For each digit in the data, a stream cipher, in the case of a computer a bit, performs an operation on
    18 KB (3,085 words) - 15:13, 7 December 2022
  • <big><big><big>'''Symmetries in Crystal Structure'''</big></big> <big>'''Introduction of Crystal structure '''</big>
    11 KB (1,705 words) - 03:26, 1 December 2022

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

Alumni Liaison

Ph.D. 2007, working on developing cool imaging technologies for digital cameras, camera phones, and video surveillance cameras.

Buyue Zhang