Search Results - (((((((ant OR ken) OR alter) OR carters) OR cantor) OR anne) OR warter) OR anti) algorithms.

  1. 81

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  2. 82

    Data Analytics Applied to the Mining Industry. by Soofastaei, Ali

    Published 2020
    Table of Contents: “…Advanced Data Analytics -- Introduction -- Big Data -- Analytics -- Deep Learning -- CNNs -- Deep Neural Network -- Recurrent Neural Network (RNN) -- ML -- Fuzzy Logic -- Classification Techniques -- Clustering -- Evolutionary Techniques -- Genetic Algorithms (GAs) -- Ant Colony Optimization (ACO)…”
    Full text (MFA users only)
    Electronic eBook
  3. 83
  4. 84

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  5. 85
  6. 86
  7. 87

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  8. 88

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  9. 89

    Modern optimization methods for science, engineering and technology

    Published 2020
    Table of Contents: “…Implementing the traveling salesman problem using a modified ant colony optimization algorithm -- 5.1. ACO and candidate list -- 5.2. …”
    Full text (MFA users only)
    Electronic eBook
  10. 90

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  11. 91

    Advances in nonlinear waves and symbolic computation by Yan, Zhenya

    Published 2009
    Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
    Full text (MFA users only)
    Electronic eBook
  12. 92
  13. 93

    Communication System Security.

    Published 2012
    Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
    Full text (MFA users only)
    Electronic eBook
  14. 94

    Analysis of biological data : a soft computing approach

    Published 2007
    Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
    Full text (MFA users only)
    Electronic eBook
  15. 95

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  16. 96
  17. 97

    Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...

    Published 2011
    Table of Contents: “…Solder Selection of Lead-Free Reflow Soldering and Optimization of Craft CurveLow Reflectivity ErAlO Film on Si as Anti-Reflecting Coating in Solar Cells; Genesis Analysis of Common Defects of Reflow Soldering and Research for Solutions; Key Parameter Optimization in Wave Soldering; A Dynamic Clustering Querying Algorithm Based on Grid in Manufacturing System; Design of Accelerator in Wind Power Generator with Creative Mechanical Design Methodology; Analyze of Traditional Clothing Manufacturing Technology and Five Traditional Colors Based on Management Principle…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 98

    Advanced Printing and Packaging Materials and Technologies

    Published 2015
    Table of Contents: “…An Automatic Calculation Method of MTF and the Application in Blurred Images Restoration; An Image Anti-Forgery Algorithm Based on Conceal Zone Special Halftoning; An Improved Print-Scan Resistant Watermarking Scheme; Research on the Character and Line Quality Evaluation Model Based on Human Visual System; Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph; A Novel Approach of Edge Detection Based on Gray Correlation Degree and Kirsch Operator; A Novel Digital Watermark Algorithm Based on a Fingerprint Image.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 99

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  20. 100

    Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...

    Published 2012
    Table of Contents: “…A Study on Corrosion Resistance and Weatherability of Fluorocarbon Anti-Corrosion Coatings for External Surface of Ocean PlatformA Study on the Mechanical Properties of Polymer-Ceramic Composite Using Injection Moulding; An Enhanced Resolution Three-Dimensional Transformation Method Based on Discrete Wavelet Transform; An Entropy Based Analytical Model for Thermoelastic Damping in Micromechanical Resonators; An Improved Ant Colony Optimization for Large-Scale Simple Assembly Line Balancing Problem of Type-1…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook