Search Results - (((((((ant OR antiii) OR semantic) OR art) OR cantor) OR anne) OR maarten) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 44
- Artificial intelligence 43
- Mathematical models 41
- Mathematics 27
- Mathematical optimization 26
- Machine learning 25
- artificial intelligence 22
- Data mining 19
- Computer networks 15
- Artificial Intelligence 14
- Computer science 14
- Technological innovations 14
- Information technology 13
- Algorithms 12
- Management 12
- Computer simulation 11
- Data Mining 11
- History 11
- Bioinformatics 10
- Computational linguistics 10
- Digital techniques 10
- Neural networks (Computer science) 10
- Philosophy 10
- algorithms 10
- Big data 9
- Computational Biology 9
- Machine Learning 9
- Security measures 9
- Social aspects 9
- Design and construction 8
Search alternatives:
- ant »
- antiii »
- semantic »
- cantor »
- mantis »
-
261
Handbook on semidefinite, conic and polynomial optimization
Published 2012Table of Contents: “…Lasserre and Mihai Putinar -- Self-regular interior-point methods for semidefinite optimization / Maziar Salahi and Tamás Terlaky -- Elementary optimality conditions for nonlinear SDPs / Florian Jarre -- Recent progress in interior-point methods: cutting-plane algorithms and warm starts / Alexander Engau -- Exploiting sparsity in SDP relaxation of polynomial optimization problems / Sunyoung Kim and Masakazu Kojima -- Block coordinate descent methods for semidefinite programming / Zaiwen Wen, Donald Goldfarb, and Katya Scheinberg -- Projection methods in conic optimization / Didier Henrion and Jérôme Malick -- SDP relaxations for non-commutative polynomial optimization / Miguel Navascués, Stefano Pironio, and Antonio Acín -- Semidefinite programming and constraint programming / Willem-Jan van Hoeve -- The state-of-the-art in conic optimization software / Hans D. …”
Full text (MFA users only)
Electronic eBook -
262
The virtual life of film
Published 2007Table of Contents: “…Film begets video -- The death of cinema and the birth of film studies -- A medium in all things -- Automatisms and art -- Automatism and photography -- Succession and the film strip -- Ways of worldmaking -- A world past -- An ethics of time -- III. …”
Full text (MFA users only)
Electronic eBook -
263
Cognitive Electronic Warfare : An Artificial Intelligence Approach.
Published 2021Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
Full text (MFA users only)
Electronic eBook -
264
Three Views of Logic : Mathematics, Philosophy, and Computer Science.
Published 2014Table of Contents: “…Proof Theory; 1 Propositional Logic; 1.1 Propositional Logic Semantics; 1.2 Syntax: Deductive Logics; 1.3 The Resolution Formal Logic; 1.4 Handling Arbitrary Propositional Wffs; 2 Predicate Logic; 2.1 First-Order Semantics; 2.2 Resolution for the Predicate Calculus; 2.2.1 Substitution; 2.2.2 The Formal System for Predicate Logic; 2.2.3 Handling Arbitrary Predicate Wffs; 3 An Application: Linear Resolution and Prolog; 3.1 OSL-Resolution; 3.2 Horn Logic; 3.3 Input Resolution and Prolog; Appendix A: The Induction Principle.…”
Full text (MFA users only)
Electronic eBook -
265
Big data in medical science and healthcare management : diagnosis, therapy, side effects
Published 2016Table of Contents: “…Autopilot and "doctor algorithm"? -- 1. Intro big data for healthcare? / Peter Langkafel -- 2. …”
Full text (MFA users only)
Electronic eBook -
266
Real-time database systems : architecture and techniques
Published 2001Full text (MFA users only)
Electronic eBook -
267
The Fifth Decade of Cardiac Pacing.
Published 2007Table of Contents: “…; 11 Permanent and Temporary Single-Lead VDD and DDD Pacing: State of the Art; 12 Pacemaker Memory: Basic Concepts and New Technology; 13 Future Trends in Pacemaker Technology; 14 Diagnosis of Supraventricular Tachyarrhythmias by Automatic Mode-Switching Algorithms of Dual-Chamber Pace.…”
Full text (MFA users only)
Electronic eBook -
268
Integrated and collaborative product development environment : technologies and implementations
Published 2006Table of Contents: “…5.4 Experimental Results5.4.1 Sample parts; 5.4.2 Computation results; 5.4.3 Comparisons of constraint handling methods; 5.4.4 Algorithm implementation; 5.5 Summary; 6. Collaborative Computer-Aided Design -- State-of-the-Art; 6.1 Introduction; 6.2 Visualisation-based Collaborative Systems; 6.2.1 3D representations for Web applications; 6.2.2 System architectures and implementation strategies; 6.3 Co-design Collaborative Systems; 6.3.1 System architectures; 6.3.2 Design coordination and team management; 6.3.3 Optimised feature and assembly-based representations.…”
Full text (MFA users only)
Electronic eBook -
269
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
270
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
Full text (MFA users only)
Electronic eBook -
271
-
272
HTML5 Multimedia Development Cookbook.
Published 2011Table of Contents: “…More flexible footer contentApplying the outline algorithm; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Are you sure?…”
Full text (MFA users only)
Electronic eBook -
273
Circuit analysis
Published 2011Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
274
From text to political positions : text analysis across disciplines
Published 2014Table of Contents: “…Conditional probabilities and associative framing ; Semantic network analysis.…”
Full text (MFA users only)
Electronic eBook -
275
Challenges in information technology management
Published 2008Table of Contents: “…Improved data mining algorithms for frequent patterns with composite items / Ke Wang, James N.K. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
276
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
Full text (MFA users only)
Electronic eBook -
277
Meeting security challenges through data analytics and decision support
Published 2016Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
278
Fuzzy systems and data mining II : proceedings of FSDM 2016
Published 2016Table of Contents: “…Adaptive Fuzzy Sliding-Mode Control of Robot and SimulationHesitant Bipolar Fuzzy Set and Its Application in Decision Making; Chance Constrained Twin Support Vector Machine for Uncertain Pattern Classification; Set-Theoretic Kripke-Style Semantics for Monoidal T-Norm (Based) Logics; Data Mining; Dynamic Itemset Mining Under Multiple Support Thresholds; Deep Learning with Large Scale Dataset for Credit Card Data Analysis; Probabilistic Frequent Itemset Mining Algorithm over Uncertain Databases with Sampling; Priority Guaranteed and Energy Efficient Routing in Data Center Networks.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
279
Smart buildings, smart communities and demand response
Published 2021Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
Full text (MFA users only)
Electronic eBook -
280
Mobile opportunistic networks : architectures, protocols and applications
Published 2011Full text (MFA users only)
Electronic eBook