Search Results - ("algorithm" OR "algorithms")
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 220
- Mathematics 191
- Algorithms 134
- Artificial intelligence 127
- algorithms 122
- Machine learning 119
- Computer algorithms 93
- methods 85
- artificial intelligence 82
- Mathematical optimization 79
- Data mining 78
- Computer networks 65
- Digital techniques 62
- Diseases 59
- Signal processing 58
- Technological innovations 58
- Computer simulation 56
- Research 56
- Computer science 53
- Artificial Intelligence 50
- Social aspects 49
- Statistical methods 48
- Image processing 47
- Information technology 45
- Security measures 44
- Bioinformatics 42
- Data Mining 42
- Numerical analysis 42
- Wireless communication systems 42
-
601
Randomness through computation : some answers, more questions
Published 2011Table of Contents: “…Randomness and computation in connection to the physical world -- pt. 3. Algorithmic inference and artificial intelligence -- pt. 4. …”
Full text (MFA users only)
Electronic eBook -
602
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
603
AI-Enabled 6G Networks and Applications.
Published 2023Table of Contents: “…Cover -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Preface -- About the Editors -- Chapter 1 Metaheuristic Moth Flame Optimization Based Energy Efficient Clustering Protocol for 6G Enabled Unmanned Aerial Vehicle Networks -- 1.1 Introduction -- 1.2 The Proposed Model -- 1.2.1 Network Model -- 1.2.2 Algorithmic Procedure of MFO Algorithm -- 1.2.3 Design of MMFO-EEC Technique -- 1.3 Experimental Validation -- 1.4 Conclusion -- References -- Chapter 2 A Novel Data Offloading with Deep Learning Enabled Cyberattack Detection Model for Edge Computing in 6G Networks…”
Full text (MFA users only)
Electronic eBook -
604
Theory of information : fundamentality, diversity and unification
Published 2010Table of Contents: “…Algorithmic information theory based on recursive algorithms : recursive approach. 5.3. …”
Full text (MFA users only)
Electronic eBook -
605
Data clustering in C++ : an object-oriented approach
Published 2011Table of Contents: “…A C++ data clustering framework -- 3. Data clustering algorithms.…”
Full text (MFA users only)
Electronic eBook -
606
Co-Clustering.
Published 2013Table of Contents: “…EM algorithm; 1.4.1. Complete data and complete-data likelihood; 1.4.2. …”
Full text (MFA users only)
Electronic eBook -
607
Artificial neural systems : principle and practice
Published 2015Table of Contents: “…INTRODUCTIONDENSITY BASED ALGORITHMS: CLUSTERING ALGORITHMS; NATURE-BASED ALGORITHMS; Evolutionary Algorithm and Programming ; Genetic Algorithm; GA Operators; APPLICATIONS OF GENETIC ALGORITHM; NETWORK METHOD: EDGES AND NODES; MULTI-LAYERED PERCEPTRON; REAL-TIME APPLICATIONS OF STATE-OF-THE-ART ANN SYSTEMS; DEFINITION OF ARTIFICIAL NEURAL NETWORKS (ANN); Intelligence; An Artificial Neural Network (ANN) system; PERFORMANCE MEASURES; Receiver's Operating Characteristics (ROC); Hypothesis Testing; Chi-squared (Goodness-of-fit) Test; CONFLICT OF INTEREST; ACKNOWLEDGEMENTS; REFERENCES…”
Full text (MFA users only)
Electronic eBook -
608
Modeling and optimization of air traffic
Published 2013Table of Contents: “…pt. 1: Optimization and artificial evolution -- Optimization: State of the art -- Genetic algorithms and improvements -- A new concept for genetic algorithms based on order statistics -- pt. 2: Applications to air traffic control -- Air traffic control -- Contributions to airspace sectorization -- Contribution to traffic assignment -- Airspace congestion metrics -- Conclusion and future perspectives.…”
Full text (MFA users only)
Electronic eBook -
609
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
610
Smart intelligent computing and communication technology
Published 2021Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
611
Advanced engineering solutions : selected peer reviewed papers from the 4th International Conference on Intelligent Structure and Vibration Control (ISVC 2014), July 25-28, 2014, C...
Published 2014Table of Contents: “…Electromagnetic Spider Web Application in Earthquake Prediction Tracking Target Identification Model Based on Multiple Algorithms; Comparison of Gas Chromatography and Liquid Chromatogram Detecting Pesticide Residue; Fingerprint Identification Scheme Based on Distribution Density; GPU Parallel Computing Algorithm in Target Tracking of Space; Image Processing Algorithm Based on Solitary Wave; Image Restoration of Depth of Field Extension Imaging System Based on Genetic Algorithm; Research of Speech Recognition Based on Neural Network; Research on Improvement Algorithm of Image Edge Detection…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
612
Handbook of Mixture Analysis
Published 2018Table of Contents: “…1.3.2 Label switching1.4 Inference; 1.4.1 Frequentist inference, and the role of EM; 1.4.2 Bayesian inference, and the role of MCMC; 1.4.3 Variable number of components; 1.4.4 Modes versus components; 1.4.5 Clustering and classification; 1.5 Concluding Remarks; Bibliography; 2: EM Methods for Finite Mixtures; 2.1 Introduction; 2.2 The EM Algorithm; 2.2.1 Description of EM for finite mixtures; 2.2.2 EM as an alternating-maximization algorithm; 2.3 Convergence and Behavior of EM; 2.4 Cousin Algorithms of EM; 2.4.1 Stochastic versions of the EM algorithm; 2.4.2 The Classification EM algorithm…”
Full text (MFA users only)
Electronic eBook -
613
Domain Decomposition Methods in Science and Engineering.
Published 1994Table of Contents: “…Intro; Contents; Preface; List of Participants; Part I: Theory; Invited Lectures; Domain decomposition methods using modified basis functions; Uniform convergence estimates for multigrid V-cycle algorithms with less than full elliptic regularity; A three-field domain decomposition method; Self-adaptive coupling of mathematical models and/or numerical methods; Noniterative domain decomposition for second order hyperbolic problems; Some recent results on Schwarz type domain decomposition algorithms; Overlapping domain decomposition methods for parabolic problems.…”
Full text (MFA users only)
Electronic eBook -
614
Ieee series on digital & mobile communication : fundamentals of convolutional coding (2nd edition).
Published 2015Table of Contents: “…4.8 Tailbiting trellises 293 -- 4.9 Decoding of tailbiting codes 302 -- 4.10 BEAST decoding of tailbiting codes 308 -- 4.11 Comments 323 -- Problems 324 -- 5 Random ensemble bounds for decoding error probability 333 -- 5.1 Upper bounds on the output error burst lengths 333 -- 5.2 Bounds for periodically timevarying convolutional codes 345 -- 5.3 Lower error probability bounds for convolutional codes 355 -- 5.4 General bounds for timevarying convolutional codes 363 -- 5.5 Bounds for finite backsearch limits 375 -- 5.6 Quantization of channel outputs 379 -- 5.7 Comments 384 -- Problems 384 -- 6 List decoding 387 -- 6.1 List decoding algorithms 388 -- 6.2 List decoding-performance 391 -- 6.3 The list minimum weight 397 -- 6.4 Upper bounds on the probability of correct path loss 407 -- 6.5 Lower bound on the probability of correct path loss 416 -- 6.6 Correct path loss for timeinvariant convolutional codes 418 -- 6.7 Comments 422 -- Problems 423 -- 7 Sequential decoding 425 -- 7.1 The Fano metric 426 -- 7.2 The stack algorithm 431 -- 7.3 The Fano algorithm 433 -- 7.4 The Creeper algorithm* 436 -- 7.5 Simulations 448 -- 7.6 Computational analysis of the stack algorithm 450 -- 7.7 Error probability analysis of the stack algorithm 460 -- 7.8 Analysis of the Fano algorithm 471 -- 7.9 Analysis of Creeper* 477 -- 7.10 Comments 480 -- Problems 481 -- 8 Lowdensity paritycheck codes 485 -- 8.1 LDPC block codes 486 -- 8.2 LDPC convolutional codes 496 -- 8.3 Block and convolutional permutors 508 -- 8.4 Lower bounds on distances of LDPC codes 517 -- 8.5 Iterative decoding of LDPC codes 529 -- 8.6 Iterative limits and thresholds 538 -- 8.7 Braided block codes* 553 -- 8.8 Comments 562 -- Problems 562 -- 9 Turbo coding 567 -- 9.1 Parallel concatenation of two convolutional codes 567 -- 9.2 Distance bounds of turbo codes 570 -- 9.3 Parallel concatenation of three and more convolution codes 573 -- 9.4 Iterative decoding of turbo codes 582 -- 9.5 Braided convolutional codes* 586 -- 9.6 Comments 591.…”
Full text (MFA users only)
Electronic eBook -
615
Fractional-order control systems : fundamentals and numerical implementations
Published 2017Table of Contents: “…Definitions and computation algorithms of fractional-order derivatives and integrals; 4. …”
Full text (MFA users only)
Electronic eBook -
616
Security in Fixed and Wireless Networks.
Published 2016Table of Contents: “…2.4 Estimating the Effort Needed for Cryptographic Analysis -- 2.5 Characteristics and Classification of Encryption Algorithms -- 2.6 Key Management -- 2.7 Summary -- 2.8 Supplemental Reading -- 2.9 Questions -- Chapter 3 Symmetric Cryptography -- 3.1 Encryption Modes of Block Ciphers -- 3.2 Data Encryption Standard -- 3.3 Advanced Encryption Standard -- 3.4 RC4 Algorithm -- 3.5 The KASUMI algorithm -- 3.6 Summary -- 3.7 Supplemental Reading -- 3.8 Questions -- Chapter 4 Asymmetric Cryptography -- 4.1 Basic Idea of Asymmetric Cryptography -- 4.2 Mathematical Principles -- 4.3 The RSA Algorithm…”
Full text (MFA users only)
Electronic eBook -
617
Structured Matrices in Mathematics, Computer Science, and Engineering.
Published 2001Table of Contents: “…Contents -- Foreword -- Part V. Fast Algorithms -- The Schur algorithm for matrices with Hessenberg displacement structure -- Fast inversion algorithms for a class of block structured matrices -- A fast and stable solver for recursively semi-separable systems of linear equations -- Part VI. …”
Full text (MFA users only)
Full text (MFA users only)
Electronic eBook -
618
Advances in Computational Intelligence : Theory & Applications
Published 2006Table of Contents: “…Hall -- 4. Marginal learning algorithms in statistical machine learning / Q. Tao and J. …”
Full text (MFA users only)
Electronic eBook -
619
Clustering challenges in biological networks
Published 2009Table of Contents: “…Fixed-parameter algorithms for graph-modeled data clustering / F. Hüffner, R. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
620
Compressive sensing for wireless networks
Published 2013Table of Contents: “…Sparse optimization algorithms.…”
Full text (MFA users only)
Electronic eBook