Search Results - ("algorithm" OR "algorithms")
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 220
- Mathematics 191
- Algorithms 134
- Artificial intelligence 127
- algorithms 122
- Machine learning 119
- Computer algorithms 93
- methods 85
- artificial intelligence 82
- Mathematical optimization 79
- Data mining 78
- Computer networks 65
- Digital techniques 62
- Diseases 59
- Signal processing 58
- Technological innovations 58
- Computer simulation 56
- Research 56
- Computer science 53
- Artificial Intelligence 50
- Social aspects 49
- Statistical methods 48
- Image processing 47
- Information technology 45
- Security measures 44
- Bioinformatics 42
- Data Mining 42
- Numerical analysis 42
- Wireless communication systems 42
-
641
Evolutionary optimization
Published 2002Table of Contents: “…Cover -- Contents -- Preface -- Contributing Authors -- Part I Introduction -- 1 Conventional Optimization Techniques -- 1 Classifying Optimization Models -- 2 Linear Programming -- 3 Goal Programming -- 4 Integer Programming -- 5 Nonlinear Programming -- 6 Simulation -- 7 Further Reading -- 2 Evolutionary Computation -- 1 What Is Evolutionary Computation -- 2 A Brief Overview of Evolutionary Computation -- 3 Evolutionary Algorithm and Generate-and-Test Search Algorithm -- 4 Search Operators -- 5 Summary -- Part II Single Objective Optimization -- 3 Evolutionary Algorithms and Constrained Optimization -- 1 Introduction -- 2 General considerations -- 3 Numerical optimization -- 4 Final Remarks -- 4 Constrained Evolutionary Optimization -- 1 Introduction -- 2 The Penalty Function Method -- 3 Stochastic Ranking -- 4 Global Competitive Ranking -- 5 How Penalty Methods Work -- 6 Experimental Study -- 7 Conclusion -- Appendix: Test Function Suite -- Part III Multi-Objective Optimization -- 5 Evolutionary Multiobjective Optimization -- 1 Introduction -- 2 Definitions -- 3 Historical Roots -- 4 A Quick Survey of EMOO Approaches -- 5 Current Research -- 6 Future Research Paths -- 7 Summary -- 6 MEA for Engineering Shape Design -- 1 Introduction -- 2 Multi-Objective Optimization and Pareto-Optimality -- 3 Elitist Non-dominated Sorting GA (NSGA-II) -- 4 Hybrid Approach -- 5 Optimal Shape Design -- 6 Simulation Results -- 7 Conclusion -- 7 Assessment Methodologies for MEAs -- 1 Introduction -- 2 Assessment Methodologies -- 3 Discussion -- 4 Comparing Two Algorithms: An Example -- 5 Conclusions and Future Research Paths -- Part IV Hybrid Algorithms -- 8 Hybrid Genetic Algorithms -- 1 Introduction -- 2 Hybridizing GAs with Local Improvement Procedures -- 3 Adaptive Memory GA's -- 4 Summary -- 9 Combining choices of heuristics -- 1 Introduction -- 2 GAs and parameterised algorithms -- 3 Job Shop Scheduling -- 4 Scheduling chicken catching -- 5 Timetabling -- 6 Discussion and future directions -- 10 Nonlinear Constrained Optimization -- 1 Introduction -- 2 Previous Work -- 3 A General Framework to look for SPdn -- 4 Experimental Results -- 5 Conclusions -- Part V Parameter Selection in EAs -- 11 Parameter Selection -- 1 Introduction -- 2 Parameter tuning vs. parameter control -- 3 An example -- 4 Classification of Control Techniques -- 5 Various forms of control -- 6 Discussion -- Part VI Application of EAs to Practical Problems -- 12 Design of Production Facilities -- 1 Introduction -- 2 Design for Material Flow When the Number of I/O Points is Unconstrained -- 3 Design for Material Flow for a Single I/O Point -- 4 Considering Intradepartmental Flow -- 5 Material Handling System Design -- 6 Concluding Remarks -- 13 Virtual Population and Acceleration Techniques -- 1 Introduction -- 2 Concept of Virtual Population -- 3 Solution Acceleration Techniques -- 4 Accelerated GA and Acceleration Sche.…”
Full text (MFA users only)
Electronic eBook -
642
Optical networks and components : fundamentals and advances. Volume II, Advances in optical networks and components
Published 2020Table of Contents: “…3.2.4 Analysis of ILP -- 3.3 Routing -- 3.3.1 Routing Algorithms -- 3.3.1.1 Dijkstra's Algorithm -- 3.3.1.2 Bellman-Ford Algorithm -- 3.3.2 Routing Approaches -- 3.3.2.1 Fixed Routing -- 3.3.2.2 Fixed-Alternate Routing -- 3.3.2.3 Flooding -- 3.3.2.4 Adaptive Routing -- 3.3.2.5 Fault-Tolerant Routing -- 3.3.2.6 Randomized Routing -- 3.4 WA Subproblem (Heuristics) -- 3.4.1 Wavelength Search Algorithm -- 3.4.1.1 Exhaustive Search -- 3.4.1.2 Tabu Search -- 3.4.1.3 Simulated Annealing -- 3.4.1.4 Genetic Algorithms -- 3.4.2 WA Heuristics -- 3.4.2.1 Random WA (R) -- 3.4.2.2 First-Fit (FF) Approach…”
Full text (MFA users only)
Electronic eBook -
643
Wavelet Methods in Mathematical Analysis and Engineering.
Published 2010Table of Contents: “…Preface; Contents; Jianfeng Cai, Raymond Chan, Lixin Shen, Zuowei Shen: Tight Frame Based Method for High-Resolution Image Reconstruction; Abstract; 1 High-resolution image reconstruction model; 2 Preliminaries on tight framelets; 3 Tight frame system arising from highresolution image reconstruction; 4 Algorithms; 5 Analysis of Algorithm I; 6 Numerical experiments; References; Albert Cohen: Greedy Algorithms for Adaptive Triangulations and Approximations; Abstract; 1 Introduction; 2 Best N -term approximation; 3 Adaptive triangulations; References.…”
Full text (MFA users only)
Electronic eBook -
644
Evolutionary Computation with Biogeography-Based Optimization.
Published 2016Table of Contents: “…Artificial bee colony algorithm; 2.4. Conclusion; 3. A Basic BBO Algorithm; 3.1. …”
Full text (MFA users only)
Electronic eBook -
645
Machine Learning with Spark and Python : Essential Techniques for Predictive Analytics
Published 2019Table of Contents: “…Front Matter -- The Two Essential Algorithms for Making Predictions -- Understand the Problem by Understanding the Data -- Predictive Model Building -- Penalized Linear Regression -- Building Predictive Models Using Penalized Linear Methods -- Ensemble Methods -- Building Ensemble Models with Python.…”
Full text (MFA users only)
Electronic eBook -
646
Duality and Approximation Methods for Cooperative Optimization and Control.
Published 2014Table of Contents: “…Intro; 1 Introduction; 1.1 Motivation and Focus; 1.2 Contributions and Organization; 2 Polyhedral Approximation Methods for Cooperative Optimization; 2.1 Introduction; 2.2 Distributed Algorithms in Peer-to-Peer Networks; 2.2.1 Communication Network Model; 2.2.2 Distributed Algorithms; 2.2.3 Complexity Notions; 2.3 The Cutting-Plane Consensus Algorithm; 2.3.1 General Problem Formulation; 2.3.2 Unique Solution Linear Programming; 2.3.3 The Algorithm Definition; 2.3.4 Technical Analysis; 2.4 Convex Inequality Constraints; 2.4.1 Problem Formulation; 2.4.2 Semidefinite Constraints.…”
Full text (MFA users only)
Electronic eBook -
647
Network Security.
Published 2014Table of Contents: “…The encryption function; 1.1.1. 3DES algorithm; 1.1.2. AES algorithm; 1.1.3. RSA algorithm; 1.1.4. …”
Full text (MFA users only)
Electronic eBook -
648
Optimization in polymer processing
Published 2011Table of Contents: “…Multi-Objective Evolutionary Algorithms ; 3. DECISION MAKING ; 3.1. Current Methods ; 2.2. …”
Full text (MFA users only)
Electronic eBook -
649
Celebrating 40 years of ICT in libraries, museums, and archives : institutional repositories.
Published 2006Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Editorial; An algorithm for suffix stripping; The Porter stemming algorithm: then and now; Repositories for research: Southampton's evolving role in the knowledge cycle; Digital preservation in the context of institutional repositories; Design and development of an institutional repository at the Indian Institute of Technology Kharagpur; Personal name identification in the practice of digital repositories; Using OAI-PMH and METS for exporting metadata and digital objects between repositories…”
Full text (MFA users only)
Electronic eBook -
650
Data Mining Models, Second Edition.
Published 2018Table of Contents: “…Cover; Contents; Acknowledgments; Chapter 1: Data Mining in Business; Chapter 2: Business Data Mining Tools; Chapter 3: Data Mining Processes and Knowledge Discovery; Chapter 4: Overview of Data Mining Techniques; Chapter 5: Data Mining Software; Chapter 6: Regression Algorithms in Data Mining; Chapter 7: Neural Networks in Data Mining; Chapter 8: Decision Tree Algorithms; Chapter 9: Scalability; Notes; References; Index; Adpage; Backcover.…”
Full text (MFA users only)
Electronic eBook -
651
Practical Approach to Pediatric Gastroenterology, Hepatology and Nutrition.
Published 2013Table of Contents: “…Differential diagnosis (see Algorithm 9.1)Toddler diarrhoea; Investigations; Treatment; Outcome; Protein-losing enteropathy; Causes; Investigations; Management; Outcome; Investigations (screening tests in bold); Management; CHAPTER 10: The child with chronic diarrhoea; Important features from history; Differential diagnosis; Investigations; Management; Crohn's disease (see Algorithm 10.1); Ulcerative colitis; Inflammatory bowel disease specialist nurses; Patient education; Key web links; CHAPTER 11: Gastrointestinal bleeding; Causes (see Table 11.1); Investigations (see Algorithm 11.1).…”
Full text (MFA users only)
Electronic eBook -
652
Advances in intelligent structure and vibration control : selected, peer reviewed papers from the International Conference on Intelligent Structure and Vibration Control (ISVC 2012...
Published 2012Table of Contents: “…Influences of Heat Treatment on Spinning Process with Large Thinning Rate and Performance of 30CrMnSiAThe DNA Genetic Algorithm Applied for Solving Optimal Placement of Sensors; Research on an Improved Cellular Automata Model; Control Algorithm Research of Electric Actuator Based on Switched Reluctance Motor; Study on Structure Including Interface Based on Interface Stress Element Method; A Probability Assessment Method for Degradation of Bridge Power MOSFET Circuit Based on Common Turn-On State…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
653
Applied information and digital image technologies, control and power engineering : selected, peer reviewed papers from the International Conference on Energy Efficient Technologie...
Published 2014Table of Contents: “…Applied Information and Digital Image Technologies, Control and Power Engineering; Introduction and Technical Committee; Table of Contents; Security Method for Multimedia Content by Using Watermarking; Web Log Mining to Enhance Surfing Experience; Performance Analysis of Minimum Distance Classifier and Clustering Algorithm in CBIR; Distance Based Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks; Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes; Shadow Removal Using Inpainting and Interpolation Technique…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
654
Handbook of simulation optimization
Published 2015Table of Contents: “…Preface; Contents; Contributors; Selected Abbreviations and Notation; 1 Overview of the Handbook; References; 2 Discrete Optimization via Simulation; 2.1 Introduction; 2.1.1 Designing a Highly Reliable System; 2.1.2 Flow-Line Throughput; 2.1.3 Inventory Management with Dynamic Customer Substitution; 2.1.4 Themes; 2.2 Optimality Conditions; 2.3 Ranking and Selection; 2.4 Ordinal Optimization; 2.5 Globally Convergent Random Search Algorithms; 2.6 Locally Convergent Random Search Algorithms; 2.7 Algorithm Enhancements; 2.8 Using Commercial Solvers.…”
Full text (MFA users only)
Electronic eBook -
655
Wireless Sensor and Ad Hoc Networks Under Diversified Network Scenarios.
Published 2012Table of Contents: “…3.4 Discussion of Various Routing Protocols3.4.1 Ad Hoc On Demand Distance Vector Routing Protocol; 3.4.2 Ad Hoc On Demand Distance Vector Routing Algorithm by Uppsala University (AODVUU); 3.4.3 Ad Hoc On Demand Multipath Distance Vector Routing Algorithm; 3.4.4 Reverse Ad Hoc On Demand Distance Vector Routing Algorithm (RAODV); 3.4.5 Dynamic Source Routing Algorithm (DSR); 3.4.6 Destination Sequence Distance Vector Routing Algorithm (DSDV); 3.4.7 Dynamic MANET On Demand (DYMO) Routing Protocol; 3.4.8 Fisheye State Routing Protocol (FSR); 3.4.9 Location-Aided Routing (LAR) Protocol.…”
Full text (MFA users only)
Electronic eBook -
656
Pattern recognition : practices, perspectives, and challenges
Published 2013Table of Contents: “…Principal Component Analysis (PCA)3.1.2. Clustering Algorithms; 3.2. Supervised Learning; 3.2.1. Linear Discriminant Analysis (LDA); 3.2.2. …”
Full text (MFA users only)
Electronic eBook -
657
Discrete Mathematics for Computer Science : An Example-Based Introduction.
Published 2021Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
Full text (MFA users only)
Electronic eBook -
658
A Beginner's Guide to Multilevel Image Thresholding.
Published 2020Table of Contents: “…Limitations in Traditional Thresholding -- 4.3. Need for Heuristic Algorithm -- 4.4. Selection of Heuristic Algorithm -- 4.4.1. …”
Full text (MFA users only)
Electronic eBook -
659
Informatics for Materials Science and Engineering : Data-driven Discovery for Accelerated Experimentation and Application.
Published 2013Table of Contents: “…Dimensionality Reduction Methods: Algorithms, Advantages, and Disadvantages; 3.1 Principal Component Analysis (PCA); PCA Algorithm; 3.2 Isomap; Isomap Algorithm; 3.3 Locally Linear Embedding; LLE Algorithm; 3.4 Hessian LLE; hLLE Algorithm; 4. …”
Full text (MFA users only)
Electronic eBook -
660
Continuing Kepler's Quest : Assessing Air Force Space Command's Astrodynamics Standards
Published 2012Table of Contents: “…Summary -- Meeting the mission -- Astrodynamics algorithms -- Systems issues -- Broader issues -- [Appendixes].…”
Full text (MFA users only)
Electronic eBook