Search Results - (((((((ant OR giant) OR mantis) OR went) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 32
- Mathematics 30
- Artificial intelligence 27
- Mathematical models 23
- Mathematical optimization 22
- Algorithms 16
- artificial intelligence 16
- algorithms 14
- Technological innovations 13
- Machine learning 12
- Digital techniques 11
- Social aspects 11
- Artificial Intelligence 10
- History 10
- Image processing 10
- Information technology 10
- Design and construction 9
- Computer networks 8
- Data mining 8
- Mechanical engineering 8
- Neural networks (Computer science) 8
- Computer graphics 7
- Engineering 7
- Manufacturing processes 7
- Automation 6
- Computer algorithms 6
- Materials 6
- Materials science 6
- Philosophy 6
- Research 6
Search alternatives:
- ant »
- giant »
- mantis »
- cantor »
- went »
-
121
Firewall design and analysis
Published 2011Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
Full text (MFA users only)
Electronic eBook -
122
Ivor Horton's beginning Visual C++ 2012
Published 2012Table of Contents: “…Algorithms --…”
Full text (MFA users only)
Electronic eBook -
123
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
124
Modern optimization methods for science, engineering and technology
Published 2020Table of Contents: “…Implementing the traveling salesman problem using a modified ant colony optimization algorithm -- 5.1. ACO and candidate list -- 5.2. …”
Full text (MFA users only)
Electronic eBook -
125
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
126
-
127
Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data
Published 2000Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
Full text (MFA users only)
Electronic eBook -
128
Stochastic Models in Reliability Engineering.
Published 2020Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
Full text (MFA users only)
Electronic eBook -
129
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
130
Parallel Computing : Advances and Current Issues, Proceedings of the International Conference Parco2001.
Published 2002Table of Contents: “…Giant Eigenproblems from Lattice Gauge Theory on CRAY T3E Systems 1 Introduction ; 2 Meson Correlators ; 3 Conventional Computation of Correlators ; 4 TEA ; 5 Results ; References ; Parallel Consistency Checking of Automotive Product Data ; 1 Introduction.…”
Full text (MFA users only)
Electronic eBook -
131
Multi-agent machine learning : a reinforcement approach
Published 2014Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
Full text (MFA users only)
Electronic eBook -
132
Radon Transforms and Tomography.
Published 2001Table of Contents: “…Expository Papers -- Local tomography and related problems -- Tomography problems arising in synthetic aperture radar -- Introduction to local tomography -- Algorithms in ultrasound tomography -- Radon transforms, differential equations, and microlocal analysis -- Supplementary bibliography to A bibliographic survey of the Pompeiu problem -- II. …”
Full text (MFA users only)
Electronic eBook -
133
Pervasive Computing in Cognitive Communications Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
Full text (MFA users only)
eBook -
134
Analysis of biological data : a soft computing approach
Published 2007Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
Full text (MFA users only)
Electronic eBook -
135
Smart intelligent computing and communication technology
Published 2021Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
136
Reconstructing evolution : new mathematical and computational advances
Published 2007Full text (MFA users only)
Electronic eBook -
137
Risk management technology in financial services : risk control, stress testing, models, and IT systems and structures
Published 2007Table of Contents: “…-- Chapter 3 Complxity of risk control with derivatives -- Chapter 4 Intergrating risk management through an enterprise architecure -- Chapter 5 Case studies on big product problems that went unattended -- Part 2 Risk control methodology and advanced models -- Chapter 6 A methodology for risk management -- Chapter 7 The contribution of models to experimentation -- Chapter 8 Simulation -- Chapter 9 Using knowledge engineering for risk control -- Chapter 10 Optimization through genetic algorithms -- Chapter 11 Testing, backtesting, post-mortems and experimental methodology -- Part 3 Increasing the effectiveness of information systems support -- Chapter 12 Adding value to risk control through IT and organization -- Chapter 13 Technology for time management, high frequency financial data and high impact events -- Chapter 14 Project management for IT and risk control -- Chapter 15 Implementing design reviews -- Chapter 16 Quality, reliability and availability -- Chapter 17 Being in charge of IT costs -- Index.…”
Full text (MFA users only)
Electronic eBook -
138
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
139
Numerical methods for viscosity solutions and applications
Published 2001Full text (MFA users only)
Electronic eBook -
140
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook