Search Results - (((((((ant OR manthe) OR find) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 141

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 142

    Fundamentals of patenting and licensing for scientists and engineers by Ma, Matthew Y.

    Published 2009
    Table of Contents: “…Anatomy of a patent. 4.2. Find your easiest entry point -- a first glance. 4.3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 143

    Optimization of Logistics. by Yalaoui, Alice

    Published 2012
    Table of Contents: “…2.4.1. Genetic algorithms2.4.2. Ant colonies; 2.4.3. Tabu search; 2.4.4. …”
    Full text (MFA users only)
    Electronic eBook
  4. 144

    Modeling Reality : How Computers Mirror Life. by Białynicki-Birula, Iwo

    Published 2004
    Table of Contents: “…Contents; 1 From building blocks to computers: Models and modeling; 2 The game of life: A legendary cellular automaton; 3 Heads or tails: Probability of an event; 4 Galton's board: Probability and statistics; 5 Twenty questions: Probability and information; 6 Snowflakes: The evolution of dynamical systems; 7 The Lorenz butterfly: Deterministic chaos; 8 From Cantor to Mandelbrot: Self-similarity and fractals; 9 Typing monkeys: Statistical linguistics; 10 The bridges of Königsberg: Graph theory; 11 Prisoner's dilemma: Game theory; 12 Let the best man win: Genetic algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Advances in intelligent IT : active media technology 2006

    Published 2006
    Table of Contents: “…Title page; Preface; Organization; Contents; Keynotes; Active Media Technologies (AMT) from the Standpoint of the Wisdom Web; Anytime Learning and Classification for Online Applications; Domain-Driven Data Mining: Methodologies and Applications; Regular Papers; Web Service Request Transformatter; A Head-Tracker Based on the Lucas-Kanade Optical Flow Algorithm; A Fair Peer Selection Algorithm for an Ecommerce-Oriented Distributed Recommender System; Intelligent Decision Making with the Semantic Web; Relevence Assessment of Topic Ontology; Information Extraction from a Whole Web Site.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 146

    Information technology applications in industry III : selected, peer reviewed papers from the 2014 3rd International Conference on Information Technology and Management Innovation...

    Published 2014
    Table of Contents: “…A Hybrid Simulate Annealing Algorithm Based on Aircraft Emergency Dispatching SystemA Variable Step-Size BLMS Adaptive Jamming Cancellation Algorithm Based on FFT; Adaptive Extended Kalman Filter for Nonlinear System with Noise Compensating Technology; An Improvement of Apriori Algorithm in Medical Data Mining; An Integrated Algorithm for Low-Carbon City Evaluation Based on Neural Network and Analytic Hierarchy Process; Reliability Optimization for Multi-State Series-Parallel System Design Using Ant Colony Algorithm…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 147

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  8. 148

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 149

    Integration of swarm intelligence and artificial neural network

    Published 2011
    Table of Contents: “…Dehuri -- Coherent biclusters of microarray data by imitating the ecosystem : an ant colony algorithmic approach / D. Mishra, A.K. …”
    Full text (MFA users only)
    Electronic eBook
  10. 150

    Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence. by Kvasnicka, V.

    Published 2002
    Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
    Full text (MFA users only)
    Electronic eBook
  11. 151

    Bio-inspired computation in telecommunications

    Published 2015
    Table of Contents: “…Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  12. 152

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  13. 153

    Simplified quantum computing with applications by Nagata, Koji, Do, Ngoc Diep, Farouk, Ahmed (Ph. D. in computer science), Nakamura, Tadao (Ph. D. in electronics)

    Published 2022
    Table of Contents: “…14. Quantum algorithms for finding the roots of a polynomial function -- 14.1. …”
    Full text (MFA users only)
    Electronic eBook
  14. 154

    Cybernetic intelligent systems

    Published 2014
    Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
    Full text (MFA users only)
    Electronic eBook
  15. 155
  16. 156

    Text mining : applications and theory

    Published 2010
    Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 157

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  18. 158

    Can markets compute equilibria? by Monroe, Hunter K.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  19. 159

    Three Views of Logic : Mathematics, Philosophy, and Computer Science. by Loveland, Donald W.

    Published 2014
    Table of Contents: “…Computability Theory; 4 Overview of Computability; 4.1 Decision Problems and Algorithms; 4.2 Three Informal Concepts; 5 A Machine Model of Computability; 5.1 Register Machines and RM-Computable Functions; 5.2 Operations with RM-Computable Functions; Church-Turing Thesis; LRM-Computable Functions; 5.3 RM-Decidable and RM-Semi-Decidable Relations; the Halting Problem; 5.4 Unsolvability of Hilbert's Decision Problem and Thue's Word Problem; 6 A Mathematical Model of Computability.…”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007

    Published 2007
    Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook