Search Results - (((((((ant OR anti) OR semantic) OR wind) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 181

    Topology and robotics : July 10-14, 2006, FIM ETH, Zurich

    Published 2007
    Table of Contents: “…Winding numbers for networks with weak angular data / R. …”
    Full text (MFA users only)
    Electronic eBook
  2. 182
  3. 183

    International Multi-Conference on Engineering and Technology Innovation 2015. by Li, Chenfeng

    Published 2017
    Table of Contents: “…Design of an adaptive intelligent control scheme for switched reluctance wind generatorStudy of laser displacement measurement data abnormal correction algorithm; Using a grid computing-based meta-evolutionary mining approach for the microarray data cancer-categorization; An artificial intelligent approach to the bicycle repositioning problems; Risk analysis model for regional railroad investment; A study of 3D model similarity based on surface bipartite graph matching; Generalized finite element analysis of high-rise wall-frame structural systems.…”
    Full text (MFA users only)
    Electronic eBook
  4. 184

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Advances in mechatronics, robotics and automation II : selected, peer reviewed papers from the 2014 2nd International Conference on Mechatronics, Robotics and Automation (ICMRA 201...

    Published 2014
    Table of Contents: “…Advances in Mechatronics, Robotics and Automation II; Preface and Conference Organization; Table of Contents; Chapter 1: Signal Processing System Design and Implementation; A Method of Multi-Antenna Signal Time-Delay Alignment Algorithm for Cyclostationary Signals; Analysis of Ground-Based Navigation Signal Coverage on Performance-Based Navigation; Detection and Analysis of Rats' Bioelectromagnetic Signal; Fault Diagnosis of Gearbox in Wind Turbine Based on Wavelet Transform and Support Vector Machine; Research of Multi-Channel Audio Data Acquisition System Based on FPGA and ARM.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 186

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  8. 188

    Mixed Models : Theory and Applications with R. by Demidenko, Eugene

    Published 2013
    Table of Contents: “…2.9 Derivatives of the log-likelihood function -- 2.10 Newton-Raphson algorithm -- 2.11 Fisher scoring algorithm -- 2.11.1 Simplified FS algorithm -- 2.11.2 Empirical FS algorithm -- 2.11.3 Variance-profile FS algorithm -- 2.12 EM algorithm -- 2.12.1 Fixed-point algorithm -- 2.13 Starting point -- 2.13.1 FS starting point -- 2.13.2 FP starting point -- 2.14 Algorithms for restricted MLE -- 2.14.1 Fisher scoring algorithm -- 2.14.2 EM algorithm -- 2.15 Optimization on nonnegative definite matrices -- 2.15.1 How often can one hit the boundary? …”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Modern optimization methods for science, engineering and technology

    Published 2020
    Table of Contents: “…Implementing the traveling salesman problem using a modified ant colony optimization algorithm -- 5.1. ACO and candidate list -- 5.2. …”
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Blockchain-based peer-to-peer transactions in energy systems by Nwulu, Nnamdi, Damisa, Uyikumhe

    Published 2023
    Table of Contents: “…Smart contract-based peer-to-peer energy storage-sharing architecture and algorithm -- 8.3. Smart contract functions for the storage-sharing scheme -- 8.4. …”
    Full text (MFA users only)
    Electronic eBook
  13. 193

    Multi-label dimensionality reduction by Liang Sun

    Published 2014
    Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Handbook of Modal Logic. by Blackburn, Patrick

    Published 2006
    Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
    Full text (MFA users only)
    Electronic eBook
  15. 195

    Elements of quantum computation and quantum communication by Pathak, Anirban

    Published 2013
    Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
    Full text (MFA users only)
    Electronic eBook
  16. 196

    Advances in nonlinear waves and symbolic computation by Yan, Zhenya

    Published 2009
    Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Advanced reliability modeling : part II

    Published 2006
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Advanced Control and Optimization Paradigms for Energy System Operation and Management. by Pal, Kirti

    Published 2023
    Table of Contents: “…3.4: Procedure -- 3.4.1: Solar Photovoltaic System -- 3.4.2: Wind Turbine -- 3.4.3: Battery Energy Storage System -- 3.4.4: Diesel Generator -- 3.5: Modelling of the HRES with Different kinds of Batteries -- 3.6: System Metrics -- 3.6.1: Economic Metrics -- 3.6.2: Technical Performance of the Overall System -- 3.6.3: Contribution of Solar PV -- 3.6.4: Contribution of Wind Turbine and Diesel Generator -- 3.6.5: Technical Specification of Different Batteries Used in HRES -- 3.7: State of Charge of Battery -- 3.8: Emissions through a Different System with Different Batteries -- 3.9: Conclusions…”
    Full text (MFA users only)
    Electronic eBook
  20. 200

    Trends in Functional Programming. by Nilsson, Henrik

    Published 2007
    Table of Contents: “…Front Cover; Preliminary Pages; Contents; Preface; Proving Termination Using Dependent Types: The Case of Xor-Terms; Proving the Correctness of Algorithmic Debugging for Functional Programs; Systematic Synthesis of Functions; A Purely Functional Implementation of ROBDDs in Haskell; Efficient Interpretation by Transforming Data Types and Patterns to Functions; Object-Oriented Programming in Dependent Type Theory; A Sharing Analysis for SAFE; Memory Usage Improvement Using Runtime Alias Detection; A Model of Functional Programming with Dynamic Compilation and Optimization.…”
    Full text (MFA users only)
    Electronic eBook