Search Results - (((((((ant OR kkantis) OR wants) OR hints) OR cantor) OR anne) OR file) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 88
- Mathematical models 64
- Mathematics 59
- Algorithms 48
- Artificial intelligence 46
- Machine learning 44
- algorithms 42
- artificial intelligence 34
- methods 34
- Data mining 33
- Mathematical optimization 30
- Artificial Intelligence 24
- Computer networks 24
- Python (Computer program language) 23
- Signal processing 22
- Computer algorithms 21
- Development 21
- Digital techniques 21
- Data Mining 20
- Application software 19
- Diseases 17
- Image processing 17
- Computer science 16
- Technological innovations 16
- Computational Biology 15
- Computer simulation 15
- Neural networks (Computer science) 15
- Research 15
- therapy 15
- Electronic data processing 14
Search alternatives:
- ant »
- kkantis »
- wants »
- cantor »
- granting »
-
201
Recent advances in hybrid metaheuristics for dataclustering
Published 2020Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- List of Contributors -- Series Preface -- Preface -- Chapter 1 Metaheuristic Algorithms in Fuzzy Clustering -- 1.1 Introduction -- 1.2 Fuzzy Clustering -- 1.2.1 Fuzzy c-means (FCM) clustering -- 1.3 Algorithm -- 1.3.1 Selection of Cluster Centers -- 1.4 Genetic Algorithm -- 1.5 Particle Swarm Optimization -- 1.6 Ant Colony Optimization -- 1.7 Artificial Bee Colony Algorithm -- 1.8 Local Search-Based Metaheuristic Clustering Algorithms -- 1.9 Population-Based Metaheuristic Clustering Algorithms -- 1.9.1 GA-Based Fuzzy Clustering…”
Full text (MFA users only)
Electronic eBook -
202
Topology and robotics : July 10-14, 2006, FIM ETH, Zurich
Published 2007Table of Contents: “…Farber, M. Grant and S. Yuzvinsky -- Symmetric motion planning / M. …”
Full text (MFA users only)
Electronic eBook -
203
Bio-inspired computation in telecommunications
Published 2015Table of Contents: “…Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. …”
Full text (MFA users only)
Electronic eBook -
204
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
205
-
206
Optimization of Logistics.
Published 2012Table of Contents: “…2.4.1. Genetic algorithms2.4.2. Ant colonies; 2.4.3. Tabu search; 2.4.4. …”
Full text (MFA users only)
Electronic eBook -
207
The the Python Workshop : a Practical, No-Nonsense Introduction to Python Development.
Published 2019Table of Contents: “…Table of ContentsVital Python - Math, Strings, Conditionals, and LoopsPython StructuresExecuting Python - Programs, Algorithms, and FunctionsExtending Python, Files, Errors, and GraphsConstructing Python - Classes and MethodsThe Standard LibraryBecoming PythonicSoftware DevelopmentPractical Python - Advanced TopicsData Analytics with pandas and NumPyMachine Learning.…”
Full text (MFA users only)
Electronic eBook -
208
Information technology applications in industry III : selected, peer reviewed papers from the 2014 3rd International Conference on Information Technology and Management Innovation...
Published 2014Table of Contents: “…A Hybrid Simulate Annealing Algorithm Based on Aircraft Emergency Dispatching SystemA Variable Step-Size BLMS Adaptive Jamming Cancellation Algorithm Based on FFT; Adaptive Extended Kalman Filter for Nonlinear System with Noise Compensating Technology; An Improvement of Apriori Algorithm in Medical Data Mining; An Integrated Algorithm for Low-Carbon City Evaluation Based on Neural Network and Analytic Hierarchy Process; Reliability Optimization for Multi-State Series-Parallel System Design Using Ant Colony Algorithm…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
209
Integration of swarm intelligence and artificial neural network
Published 2011Table of Contents: “…Dehuri -- Coherent biclusters of microarray data by imitating the ecosystem : an ant colony algorithmic approach / D. Mishra, A.K. …”
Full text (MFA users only)
Electronic eBook -
210
Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence.
Published 2002Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
Full text (MFA users only)
Electronic eBook -
211
TensorFlow Reinforcement Learning Quick Start Guide : Get up and Running with Training and Deploying Intelligent, Self-Learning Agents Using Python.
Published 2019Table of Contents: “…Learning the theory behind a DQNUnderstanding target networks; Learning about replay buffer; Getting introduced to the Atari environment; Summary of Atari games; Pong; Breakout; Space Invaders; LunarLander; The Arcade Learning Environment ; Coding a DQN in TensorFlow; Using the model.py file; Using the funcs.py file; Using the dqn.py file; Evaluating the performance of the DQN on Atari Breakout; Summary; Questions; Further reading; Chapter 4: Double DQN, Dueling Architectures, and Rainbow; Technical requirements; Understanding Double DQN ; Coding DDQN and training to play Atari Breakout…”
Full text (MFA users only)
Electronic eBook -
212
Handbook of Mathematical Induction.
Published 2014Table of Contents: “…Chapter 14: Logic and languageChapter 15: Graphs; Chapter 16: Recursion and algorithms; Chapter 17: Games and recreations; Chapter 18: Relations and functions; Chapter 19: Linear and abstract algebra; Chapter 20: Geometry; Chapter 21: Ramsey theory; Chapter 22: Probability and statistics; Part III: Solutions and hints to exercises; Chapter 23: Solutions: Foundations; Chapter 24: Solutions: Inductive techniques applied to the infinite; Chapter 25: Solutions: Paradoxes and sophisms; Chapter 26: Solutions: Empirical induction; Chapter 27: Solutions: Identities.…”
Full text (MFA users only)
Electronic eBook -
213
Introduction to graph and hypergraph theory
Published 2009Full text (MFA users only)
Electronic eBook -
214
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
215
Essential MATLAB for engineers and scientists
Published 2010Table of Contents: “…MATLAB fundamentals -- Program design and algorithm development -- MATLAB functions data import-export utilities -- Logical vectors -- Matrices of numbers arrays of strings -- Introduction to graphics -- Loops -- Errors and pitfalls -- Function M-files -- Vectors as arrays: advanced data structures -- More graphics -- Graphical User Interfaces (GUIs) -- Dynamics systems -- Simulation -- More matrices -- Introduction to numerical methods -- Toolboxes that come with MATLAB (web chapter).…”
Full text (MFA users only)
Electronic eBook -
216
Metaheuristics for intelligent electrical networks
Published 2017Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
Full text (MFA users only)
Electronic eBook -
217
Analysis of biological data : a soft computing approach
Published 2007Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
Full text (MFA users only)
Electronic eBook -
218
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook -
219
Implementing cryptography using Python
Published 2020Table of Contents: “…Using Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary…”
Full text (MFA users only)
Electronic eBook -
220
MATLAB for Machine Learning.
Published 2017Table of Contents: “…; Data mining and data visualization; Regression analysis; Classification; Cluster analysis; Dimensionality reduction; Neural Network Toolbox; Statistics and algebra in MATLAB; Summary; Chapter 2: Importing and Organizing Data in MATLAB; Familiarizing yourself with the MATLAB desktop; Importing data into MATLAB; The Import Wizard; Importing data programmatically; Loading variables from file; Reading an ASCII-delimited file; Comma-separated value files; Importing spreadsheets.…”
Full text (MFA users only)
Electronic eBook