Search Results - (((((((ant OR antii) OR semantic) OR arte) OR cantor) OR anne) OR maarten) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 44
- Artificial intelligence 43
- Mathematical models 41
- Mathematics 27
- Mathematical optimization 26
- Machine learning 25
- artificial intelligence 22
- Data mining 19
- Computer networks 15
- Artificial Intelligence 14
- Computer science 14
- Technological innovations 14
- Information technology 13
- Algorithms 12
- Management 12
- Computer simulation 11
- Data Mining 11
- History 11
- Bioinformatics 10
- Computational linguistics 10
- Digital techniques 10
- Neural networks (Computer science) 10
- Philosophy 10
- algorithms 10
- Big data 9
- Computational Biology 9
- Machine Learning 9
- Security measures 9
- Social aspects 9
- Design and construction 8
Search alternatives:
- ant »
- antii »
- semantic »
- cantor »
- mantis »
- arte »
- maarten »
-
281
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
282
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
283
Conversations on violence : an anthology
Published 2021Table of Contents: “…The Violence of the Algorithm -- Davide Panagia -- 14. Thinking Art in a Decolonial Way -- Lewis Gordon -- 15. …”
Full text (MFA users only)
Electronic eBook -
284
Advances in portfolio construction and implementation
Published 2003Table of Contents: “…Using genetic algorithms to construct portfolios; 6.1 Limitations of Traditional Mean-Variance Portfolio Optimization; 6.2 Selecting a Method to Limit the Number of Securities in the Final Portfolio; 6.3 Practical Construction of a Genetic Algorithm-Based Optimizer; 6.4 Performance of Genetic Algorithm; 6.5 Conclusions; References; Chapter 7. …”
Full text (MFA users only)
Electronic eBook -
285
Artificial Intelligence Research and Development.
Published 2012Table of Contents: “…Using Gabriel Graphs in Borderline-SMOTE to Deal with Severe Two-Class Imbalance Problems on Neural NetworksActive Learning of Actions Based on Support Vector Machines; Towards the Formalization of Re-Identification for Some Data Masking Methods; Natural Language Processing and Recommenders; Towards Object Descriptions in Natural Language from Qualitative Models; Semantically-Enhanced Recommenders; Computer Vision; Supervised Texture Classification Using Optimization Techniques; Modelling Facial Expressions Dynamics with Gaussian Process Regression; Survey on 2D and 3D Human Pose Recovery…”
Full text (MFA users only)
Electronic eBook -
286
Biomedical image understanding : methods and applications
Published 2014Full text (MFA users only)
Electronic eBook -
287
Artificial intelligence research and development : recent advances and applications
Published 2014Table of Contents: “…Title Page -- Preface -- Conference Organization -- Contents -- Machine Learning -- Approximate Policy Iteration with Bellman Residuals Minimization -- A Randomized Algorithm for Exact Transduction -- Comparing Feature-Based and Distance-Based Representations for Classification Similarity Learning -- Computer Vision I -- Bag-of-Tracklets for Person Tracking in Life-Logging Data -- Improving Autonomous Underwater Grasp Specification Using Primitive Shape Fitting in Point Clouds -- Emotions Classification Using Facial Action Units Recognition…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
288
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
289
Management practice for drinking water pipelines : synthesis report
Published 2013Full text (MFA users only)
Electronic eBook -
290
-
291
Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...
Published 2012Table of Contents: “…A Study on Corrosion Resistance and Weatherability of Fluorocarbon Anti-Corrosion Coatings for External Surface of Ocean PlatformA Study on the Mechanical Properties of Polymer-Ceramic Composite Using Injection Moulding; An Enhanced Resolution Three-Dimensional Transformation Method Based on Discrete Wavelet Transform; An Entropy Based Analytical Model for Thermoelastic Damping in Micromechanical Resonators; An Improved Ant Colony Optimization for Large-Scale Simple Assembly Line Balancing Problem of Type-1…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
292
Mechatronic Systems, Mechanics and Materials II : Selected, peer reviewed papers from the Symposium on Mechatronics Systems, Mechanics and Materials 2013, October 9-10, 2013, Jastr...
Published 2013Table of Contents: “…Optimization-Supported Decision-Making in the Marine Game Environment Prediction of the Spatial Orientation of a Ship by Means of Neural Networks; Safe Ship Control Method with the Use of Ant Colony Optimization; Selected Problems of the Asynchronous Drive Control with the Three-Phase Soft-Start System; System Architecture of Mission Planning and Autonomous Surface Vessel Control; The Characteristics of the Matrix Game Sensitivity of the Safe Passing of Ships at Sea; The Comparison of Parameter Identification Methods for Fractional, Partial Differential Equation; III. …”
Full text (MFA users only)
Electronic eBook -
293
Management practice for wastewater pipelines : synthesis report
Published 2013Full text (MFA users only)
Electronic eBook -
294
The linguistic cerebellum
Published 2015Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
Full text (MFA users only)
Electronic eBook -
295
Informatics for Health
Published 2017Table of Contents: “…An Automatic Approach for Analyzing Treatment Effectiveness Based on Medication Hierarchy -- The Myocardial Infarction Case Study -- Evaluation of Machine Learning Methods to Predict Coronary Artery Disease Using Metabolomic Data -- Dermatology Disease Prediction Based on Two Step Cascade Genetic Algorithm Optimization of ANFIS Parameters -- Querying EHRs with a Semantic and Entity-Oriented Query Language -- Evaluation of the Terminology Coverage in the French Corpus LiSSa -- Linked Data Applications Through Ontology Based Data Access in Clinical Research -- Epidemiological Models Lacking Process Noise Can Be Overconfident -- Disentangling Prognostic and Predictive Biomarkers Through Mutual Information -- IntegrIT -- Towards Utilizing the Swedish National Health Information Exchange Platform for Clinical Research -- Introducing a Method for Transformation of Paper-Based Research Data into Concept-Based Representation with openEHR -- The P̀EARL' Data Warehouse: Initial Challenges Faced with Semantic and Syntactic Interoperability -- Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data -- Application of Correspondence Analysis to Graphically Investigate Associations Between Foods and Eating Locations -- Data Driven Quality Improvement of Health Professions Education: Design and Development of CLUE -- An Interactive Curriculum Data Visualization Tool -- Developing Healthcare Data Analytics APPs with Open Data Science Tools -- Fast and Efficient Feature Engineering for Multi-Cohort Analysis of EHR Data -- Development and Evaluation of a Case-Based Retrieval Service -- Learning Differentially Expressed Gene Pairs in Microarray Data -- Developing a Manually Annotated Corpus of Clinical Letters for Breast Cancer Patients on Routine Follow-Up -- Automated Diagnosis Coding with Combined Text Representations.…”
Full text (MFA users only)
Electronic eBook -
296
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
297
Machine learning for protein subcellular localization prediction
Published 2015Table of Contents: “…5.2.2 Problem transformation methods -- 5.2.3 Multi-label classification in bioinformatics -- 5.3 mGOASVM: A predictor for both single- and multi-location proteins -- 5.3.1 Feature extraction -- 5.3.2 Multi-label multiclass SVM classification -- 5.4 AD-SVM: An adaptive decision multi-label predictor -- 5.4.1 Multi-label SVM scoring -- 5.4.2 Adaptive decision for SVM (AD-SVM) -- 5.4.3 Analysis of AD-SVM -- 5.5 mPLR-Loc: A multi-label predictor based on penalized logistic regression -- 5.5.1 Single-label penalized logistic regression -- 5.5.2 Multi-label penalized logistic regression -- 5.5.3 Adaptive decision for LR (mPLR-Loc) -- 5.6 Summary -- 6 Mining deeper on GO for protein subcellular localization -- 6.1 Related work -- 6.2 SS-Loc: Using semantic similarity over GO -- 6.2.1 Semantic similarity measures -- 6.2.2 SS vector construction -- 6.3 HybridGO-Loc: Hybridizing GO frequency and semantic similarity features -- 6.3.1 Hybridization of two GO features -- 6.3.2 Multi-label multiclass SVM classification -- 6.4 Summary -- 7 Ensemble random projection for large-scale predictions -- 7.1 Random projection -- 7.2 RP-SVM: A multi-label classifier with ensemble random projection -- 7.2.1 Ensemble multi-label classifier -- 7.2.2 Multi-label classification -- 7.3 R3P-Loc: A compact predictor based on ridge regression and ensemble random projection -- 7.3.1 Limitation of using current databases -- 7.3.2 Creating compact databases -- 7.3.3 Single-label ridge regression -- 7.3.4 Multi-label ridge regression -- 7.4 Summary -- 8 Experimental setup -- 8.1 Prediction of single-label proteins -- 8.1.1 Datasets construction -- 8.1.2 Performance metrics -- 8.2 Prediction of multi-label proteins -- 8.2.1 Dataset construction -- 8.2.2 Datasets analysis -- 8.2.3 Performance metrics -- 8.3 Statistical evaluation methods -- 8.4 Summary.…”
Full text (MFA users only)
Electronic eBook -
298
Handbook on soft computing for video surveillance
Published 2012Full text (MFA users only)
Electronic eBook -
299
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook -
300
Blind Identification and Separation of Complex-valued Signals
Published 2013Full text (MFA users only)
Electronic eBook