Search Results - (((((((ant OR cantee) OR find) OR wwanting) OR cantor) OR anne) OR maarten) OR tkanto) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 44
- Artificial intelligence 28
- Mathematics 27
- Machine learning 26
- Mathematical models 25
- Mathematical optimization 21
- Data mining 20
- algorithms 19
- artificial intelligence 19
- Algorithms 17
- methods 16
- Computer networks 15
- Research 14
- Computer algorithms 13
- Management 12
- Artificial Intelligence 11
- Information technology 11
- Signal processing 11
- Big data 10
- Bioinformatics 10
- Digital techniques 10
- Diseases 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- R (Computer program language) 10
- Image processing 9
- Social aspects 9
- Statistical methods 9
- Technological innovations 9
- Data Mining 8
Search alternatives:
- ant »
- cantee »
- wwanting »
- cantor »
- tkanto »
- find »
-
181
Metaheuristic applications in structures and infrastructures
Published 2013Full text (MFA users only)
Electronic eBook -
182
Principles of Quantum Computation and Information, Volume I : Basic Concepts.
Published 2004Table of Contents: “…Quantum phase estimation. 3.13. Finding eigenvalues and eigenvectors. 3.14. Period finding and Shor's algorithm. 3.15. …”
Full text (MFA users only)
Electronic eBook -
183
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
Full text (MFA users only)
Electronic eBook -
184
Knowledge discovery for business information systems
Published 2001Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
Full text (MFA users only)
Electronic eBook -
185
Fuzzy neural network theory and application
Published 2004Table of Contents: “…4.2.2 Calculus of V -- / functions4.2.3 Error function; 4.2.4 Partial derivatives of error function; 4.2.5 Learning algorithm and simulation; S4.3 Conjugate gradient algorithm for fuzzy weights; 4.3.1 Fuzzy CG algorithm and convergence; 4.3.2 GA for finding optimal learning constant; 4.3.3 Simulation examples; S4.4 Universal approximation to fuzzy valued functions; 4.4.1 Fuzzy valued Bernstein polynomial; 4.4.2 Four-layer regular feedforward FNN; 4.4.3 An example; S4.5 Approximation analysis of regular FNN; 4.5.1 Closure fuzzy mapping; 4.5.2 Learning algorithm.…”
Full text (MFA users only)
Electronic eBook -
186
Communicating process architectures 2009 : WoTUG-32
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
187
DSP software development techniques for embedded and real-time systems
Published 2006Full text (MFA users only)
Electronic eBook -
188
Discrete Mathematics for Computer Science : An Example-Based Introduction.
Published 2021Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
Full text (MFA users only)
Electronic eBook -
189
Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015
Published 2015Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
190
Mathematical morphology and its applications to image and signal processing
Published 2000Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
191
Sentient Enterprise The Evolution of Business Decision-making.
Published 2017Full text (MFA users only)
Electronic eBook -
192
Computational text analysis for functional genomics and bioinformatics
Published 2006Full text (MFA users only)
Electronic eBook -
193
Bioinformatics and Functional Genomics.
Published 2015Table of Contents: “…BLAST SEARCH STRATEGIES -- USING BLAST FOR GENE DISCOVERY: FIND-A-GENE -- PERSPECTIVE -- PITFALLS -- ADVICE FOR STUDENTS -- WEB RESOURCES -- DISCUSSION QUESTIONS -- SELF-TEST QUIZ -- SUGGESTED READING -- REFERENCES -- CHAPTER 5 Advanced Database Searching -- INTRODUCTION -- SPECIALIZED BLAST SITES -- FINDING DISTANTLY RELATED PROTEINS: POSITION-SPECIFIC ITERATED BLAST (PSI-BLAST) AND DELTA-BLAST -- PROFILE SEARCHES: HIDDEN MARKOV MODELS -- BLAST-LIKE ALIGNMENT TOOLS TO SEARCH GENOMIC DNA RAPIDLY -- ALIGNING NEXT-GENERATION SEQUENCE (NGS) READS TO A REFERENCE GENOME -- PERSPECTIVE -- PITFALLS…”
Full text (MFA users only)
Electronic eBook -
194
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook -
195
Optimization advances in electric power systems
Published 2008Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
Full text (MFA users only)
Electronic eBook -
196
-
197
Datafied society : studying culture through data
Published 2017Full text (MFA users only)
Electronic eBook -
198
-
199
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
200
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook