Search Results - (((((((ant OR canteee) OR wind) OR wanting) OR cantor) OR anne) OR maarten) OR anti) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 26
- Data processing 21
- Machine learning 20
- Mathematical models 18
- Mathematics 18
- Mathematical optimization 17
- Data mining 15
- artificial intelligence 15
- Technological innovations 13
- Artificial Intelligence 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Diseases 9
- methods 9
- Application software 8
- Data Mining 8
- Design and construction 8
- Development 8
- Electric power systems 8
- Manufacturing processes 8
- Mechanical engineering 8
- algorithms 8
- Algorithms 7
- Automatic control 7
- Information technology 7
- Machine Learning 7
- Materials 7
- Mechatronics 7
- Social aspects 7
- Bioinformatics 6
Search alternatives:
-
101
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
102
Advances in mechatronics, robotics and automation II : selected, peer reviewed papers from the 2014 2nd International Conference on Mechatronics, Robotics and Automation (ICMRA 201...
Published 2014Table of Contents: “…Advances in Mechatronics, Robotics and Automation II; Preface and Conference Organization; Table of Contents; Chapter 1: Signal Processing System Design and Implementation; A Method of Multi-Antenna Signal Time-Delay Alignment Algorithm for Cyclostationary Signals; Analysis of Ground-Based Navigation Signal Coverage on Performance-Based Navigation; Detection and Analysis of Rats' Bioelectromagnetic Signal; Fault Diagnosis of Gearbox in Wind Turbine Based on Wavelet Transform and Support Vector Machine; Research of Multi-Channel Audio Data Acquisition System Based on FPGA and ARM.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
103
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
104
Mixed Models : Theory and Applications with R.
Published 2013Table of Contents: “…2.9 Derivatives of the log-likelihood function -- 2.10 Newton-Raphson algorithm -- 2.11 Fisher scoring algorithm -- 2.11.1 Simplified FS algorithm -- 2.11.2 Empirical FS algorithm -- 2.11.3 Variance-profile FS algorithm -- 2.12 EM algorithm -- 2.12.1 Fixed-point algorithm -- 2.13 Starting point -- 2.13.1 FS starting point -- 2.13.2 FP starting point -- 2.14 Algorithms for restricted MLE -- 2.14.1 Fisher scoring algorithm -- 2.14.2 EM algorithm -- 2.15 Optimization on nonnegative definite matrices -- 2.15.1 How often can one hit the boundary? …”
Full text (MFA users only)
Electronic eBook -
105
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
106
Modern optimization methods for science, engineering and technology
Published 2020Table of Contents: “…Implementing the traveling salesman problem using a modified ant colony optimization algorithm -- 5.1. ACO and candidate list -- 5.2. …”
Full text (MFA users only)
Electronic eBook -
107
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
108
Biomedical image analysis recipes in MATLAB : for life scientists and engineers
Published 2015Full text (MFA users only)
Electronic eBook -
109
Advances in nonlinear waves and symbolic computation
Published 2009Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
Full text (MFA users only)
Electronic eBook -
110
Advanced Control and Optimization Paradigms for Energy System Operation and Management.
Published 2023Table of Contents: “…3.4: Procedure -- 3.4.1: Solar Photovoltaic System -- 3.4.2: Wind Turbine -- 3.4.3: Battery Energy Storage System -- 3.4.4: Diesel Generator -- 3.5: Modelling of the HRES with Different kinds of Batteries -- 3.6: System Metrics -- 3.6.1: Economic Metrics -- 3.6.2: Technical Performance of the Overall System -- 3.6.3: Contribution of Solar PV -- 3.6.4: Contribution of Wind Turbine and Diesel Generator -- 3.6.5: Technical Specification of Different Batteries Used in HRES -- 3.7: State of Charge of Battery -- 3.8: Emissions through a Different System with Different Batteries -- 3.9: Conclusions…”
Full text (MFA users only)
Electronic eBook -
111
Twitter and tear gas : the power and fragility of networked protest
Published 2017Full text (MFA users only)
Electronic eBook -
112
Communication System Security.
Published 2012Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
Full text (MFA users only)
Electronic eBook -
113
Analysis of biological data : a soft computing approach
Published 2007Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
Full text (MFA users only)
Electronic eBook -
114
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
115
Continuing Kepler's Quest : Assessing Air Force Space Command's Astrodynamics Standards
Published 2012Full text (MFA users only)
Electronic eBook -
116
Compressed sensing : theory and applications
Published 2012Full text (MFA users only)
Electronic eBook -
117
Hierarchical Protection for Smart Grids.
Published 2018Table of Contents: “…3.3 Local Area Protection for Centralized Renewable Energy3.3.1 Connection Form of a Wind Farm and its Protection Configuration; 3.3.2 Adaptive Distance Protection Scheme for Wind Farm Collector Lines; 3.3.3 Differential Protection Scheme for Wind Farm Outgoing Transmission Line; 3.4 Local Area Protection for Distributed Renewable Energy; 3.4.1 Adaptive Protection Approach for a Distribution Network Containing Distributed Generation; 3.4.2 Islanding Detection Method; 3.5 Summary; References; Chapter 4 Topology Analysis; 4.1 Introduction; 4.2 Topology Analysis for the Inner Substation.…”
Full text (MFA users only)
Electronic eBook -
118
Advanced Printing and Packaging Materials and Technologies
Published 2015Table of Contents: “…An Automatic Calculation Method of MTF and the Application in Blurred Images Restoration; An Image Anti-Forgery Algorithm Based on Conceal Zone Special Halftoning; An Improved Print-Scan Resistant Watermarking Scheme; Research on the Character and Line Quality Evaluation Model Based on Human Visual System; Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph; A Novel Approach of Edge Detection Based on Gray Correlation Degree and Kirsch Operator; A Novel Digital Watermark Algorithm Based on a Fingerprint Image.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
119
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
120
Monte Carlo methods and applications : proceedings of the 8th IMACS Seminar on Monte Carlo Methods, August 29-September 2, 2011, Borovets, Bulgaria
Published 2013Table of Contents: “…9.3 General Description of the Coupled Atmosphere Fire Modeling and WRF-Fire9.4 Wind Simulation Approach; 9.5 Conclusion; 10 Wireless Sensor Network Layout; 10.1 Introduction; 10.2 Wireless Sensor Network Layout Problem; 10.3 ACO for WSN Layout Problem; 10.4 Experimental Results; 10.5 Conclusion; 11 A Two-Dimensional Lorentzian Distribution for an Atomic Force Microscopy Simulator; 11.1 Introduction; 11.2 Modeling Oxidation Kinetics; 11.3 Development of the Lorentzian Model; 11.3.1 Algorithm for the Gaussian Model; 11.3.2 Development of the Lorentzian Model; 11.4 Conclusion.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook