Search Results - (((((((ant OR anti) OR semantic) OR win) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 42
- Data processing 33
- Mathematics 27
- Mathematical models 25
- Technological innovations 21
- artificial intelligence 21
- Algorithms 20
- Machine learning 19
- Data mining 18
- Mathematical optimization 18
- algorithms 17
- Information technology 16
- Computer science 15
- Management 15
- Artificial Intelligence 13
- Computer networks 13
- Big data 12
- Computer algorithms 11
- Social aspects 11
- Diseases 9
- Research 9
- methods 9
- Automatic control 8
- Computational linguistics 8
- Materials 8
- Neural networks (Computer science) 8
- Political aspects 8
- Signal processing 8
- Bioinformatics 7
- Computer programming 7
Search alternatives:
- ant »
- anti »
- semantic »
- cantor »
- win »
-
141
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
142
Computational Systems Bioinformatics (Volume 6) : Proceedings of the CSB 2007 Conference.
Published 2007Table of Contents: “…INTRODUCTION; Preprocessing to remove noisy peaks; The anti-symmetric problem; 2. ANALYSIS OF PROBLEMS AND CURRENT ALGORITHMS; 2.1. …”
Full text (MFA users only)
Electronic eBook -
143
Cybernetic intelligent systems
Published 2014Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
Full text (MFA users only)
Electronic eBook -
144
Text mining : applications and theory
Published 2010Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
145
Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007
Published 2007Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
146
Information modelling and knowledge bases XXX
Published 2019Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
147
Metaheuristics for intelligent electrical networks
Published 2017Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
Full text (MFA users only)
Electronic eBook -
148
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
149
Introduction to identity-based encryption
Published 2008Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
Full text (MFA users only)
Electronic eBook -
150
Advanced Artificial Intelligence.
Published 2011Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
Full text (MFA users only)
Electronic eBook -
151
FRBR, before and after : a look at our bibliographic models
Published 2016Full text (MFA users only)
Electronic eBook -
152
Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)
Published 2007Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
153
What Every Teacher Should Know About Effective Teaching Strategies.
Published 1900Table of Contents: “…-- Why the Way We Teach is Important -- The Linguistic Modality -- The Nonlinguistic Modality -- The Affective Modality -- Semantic Memory -- Episodic Memory -- Procedural Memory -- Automatic Memory -- Emotional Memory -- Chapter 2 -- Choosing Effective Teaching Strategies for Beginning Activities -- Great Beginnings -- The Self-System…”
Full text (MFA users only)
Electronic eBook -
154
New autonomous systems
Published 2016Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
Full text (MFA users only)
Electronic eBook -
155
3D Shape Analysis : Fundamentals, Theory and Applications.
Published 2018Table of Contents: “…7.2 Problem Formulation7.3 Mathematical Tools; 7.4 Isometric Correspondence and Registration; 7.5 Nonisometric (Elastic) Correspondence and Registration; 7.6 Summary and Further Reading; 8 Semantic Correspondences; 8.1 Introduction; 8.2 Mathematical Formulation; 8.3 Graph Representation; 8.4 Energy Functions for Semantic Labeling; 8.5 Semantic Labeling; 8.6 Examples; 8.7 Summary and Further Reading; Part IV: Applications; 9 Examples of 3D Semantic Applications; 9.1 Introduction; 9.2 Semantics: Shape or Status; 9.3 Semantics: Class or Identity; 9.4 Semantics: Behavior; 9.5 Semantics: Position…”
Full text (MFA users only)
Electronic eBook -
156
OIPE 2012
Published 2014Table of Contents: “…N-level output space mapping for electromagnetic design optimizationHigh-speed functionality optimization of five-phase PM machine using third harmonic current; Topology optimization of magnetostatic shielding using multistep evolutionary algorithms with additional searches in a restricted design space ; Adaptive unscented transform for uncertainty quantification in EMC large-scale systems; Ant colony optimization for the topological design of interior permanent magnet (IPM)machines; Multiobjective approach developed for optimizing the dynamic behavior of incremental linear actuators.…”
Full text (MFA users only)
Electronic eBook -
157
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
158
Cybernetic Intelligence
Published 2005Table of Contents: “…Editorial advisory board; Preface; Editorial; Second-order cybernetics and enactive perception; Semantic category theory cognition and conceptual reference; Bipolar logic and probabilistic interpretation; Cooperative clans; Future reasoning machines: mind and body; Machine vision methods for autonomous micro-robotic systems; Optimisation enhancement using self-organising fuzzy control; Intelligent agents and distributed models for cooperative task support; Landscape classification and problem specific reasoning for genetic algorithms; Business cybernetics: a provocative suggestion.…”
Full text (MFA users only)
Electronic eBook -
159
Artificial Intelligence and Machine Learning Fundamentals : Develop Real-World Applications Powered by the Latest AI Advances.
Published 2018Table of Contents: “…Optimizing the Minmax Algorithm with Alpha-Beta PruningDRYing up the Minmax Algorithm -- The NegaMax Algorithm; Using the EasyAI Library; Activity 4: Connect Four; Summary; Regression; Introduction; Linear Regression with One Variable; What Is Regression?…”
Full text (MFA users only)
Electronic eBook -
160
Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals
Published 2022Table of Contents: “…Words matter -- Propaganda -- Satire -- Advertising -- Public trust in journalism -- 7. Algorithms, Bots, Trolls, Cyborgs and Artificial Intelligence -- Algorithms -- Bots, trolls, cyborgs and other inauthentic activity -- 8. …”
Full text (MFA users only)
Electronic eBook