Search Results - (((((((ant OR manthe) OR fine) OR semantic) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 81

    Understanding Artificial Intelligence. by Sabouret, Nicolas

    Published 2020
    Table of Contents: “…Small but Strong: Understanding How Ants Find Their Way -- Multi-Agent Systems -- The Algorithm and the Ant -- Just Like in the Ant Colony -- Calculating a Path With Ants -- The More the Merrier! …”
    Full text (MFA users only)
    Electronic eBook
  2. 82

    Modern optimization methods for science, engineering and technology

    Published 2020
    Table of Contents: “…Implementing the traveling salesman problem using a modified ant colony optimization algorithm -- 5.1. ACO and candidate list -- 5.2. …”
    Full text (MFA users only)
    Electronic eBook
  3. 83

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  4. 84

    Artificial neural systems : principle and practice by Lorrentz, Pierre

    Published 2015
    Table of Contents: “…INTRODUCTIONDENSITY BASED ALGORITHMS: CLUSTERING ALGORITHMS; NATURE-BASED ALGORITHMS; Evolutionary Algorithm and Programming ; Genetic Algorithm; GA Operators; APPLICATIONS OF GENETIC ALGORITHM; NETWORK METHOD: EDGES AND NODES; MULTI-LAYERED PERCEPTRON; REAL-TIME APPLICATIONS OF STATE-OF-THE-ART ANN SYSTEMS; DEFINITION OF ARTIFICIAL NEURAL NETWORKS (ANN); Intelligence; An Artificial Neural Network (ANN) system; PERFORMANCE MEASURES; Receiver's Operating Characteristics (ROC); Hypothesis Testing; Chi-squared (Goodness-of-fit) Test; CONFLICT OF INTEREST; ACKNOWLEDGEMENTS; REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  5. 85

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…Cover; Title page; Contents; Preface; Programme Committee; Papers; Semantics of prialt in Handel-C"! Acceptances, Behaviours and Infinite Activity in CSPP; HCSP: Imperative State and True Concurrency; Consolidating the Agreement Problem Protocol Verification Environment; On the Complexity of Buffer Allocation in Message Passing Systems; Java PastSet -- A Structured Distributed Shared Memory System; Synchronous Active Objects Introduce CSP's Primitives in Java; Configurable Collective Communication in LAM-MPI; Cache-Affinity Scheduling for Fine Grain Multithreading.…”
    Full text (MFA users only)
    Electronic eBook
  6. 86

    Generalized Network Design Problems : Modeling and Optimization. by Pop, Petrică C.

    Published 2012
    Table of Contents: “…3.2 An efficient transformation of the GTSP into the TSP3.3 An exact algorithm for the Generalized Traveling Salesman Problem; 3.4 Integer programming formulations of the GTSP; 3.4.1 Formulations based on the properties of Hamiltonian tours; 3.4.2 Flow based formulations; 3.4.3 A local-global formulation; 3.5 Solving the Generalized Traveling Salesman Problem; 3.5.1 Reinforcing ant colony system for solving the GTSP; 3.5.2 Computational results; 3.5.3 A hybrid heuristic approach for solving the GTSP; 3.5.4 Computational results; 3.6 The drilling problem; 3.6.1 Stigmergy and autonomous robots.…”
    Full text (MFA users only)
    Electronic eBook
  7. 87

    3D Shape Analysis : Fundamentals, Theory and Applications. by Tabia, Hedi

    Published 2018
    Table of Contents: “…7.2 Problem Formulation7.3 Mathematical Tools; 7.4 Isometric Correspondence and Registration; 7.5 Nonisometric (Elastic) Correspondence and Registration; 7.6 Summary and Further Reading; 8 Semantic Correspondences; 8.1 Introduction; 8.2 Mathematical Formulation; 8.3 Graph Representation; 8.4 Energy Functions for Semantic Labeling; 8.5 Semantic Labeling; 8.6 Examples; 8.7 Summary and Further Reading; Part IV: Applications; 9 Examples of 3D Semantic Applications; 9.1 Introduction; 9.2 Semantics: Shape or Status; 9.3 Semantics: Class or Identity; 9.4 Semantics: Behavior; 9.5 Semantics: Position…”
    Full text (MFA users only)
    Electronic eBook
  8. 88

    Artificial Intelligence in Semiconductor Industry - Materials to Applications. by Wee, Hui-Ming

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
    Full text (MFA users only)
    Electronic eBook
  9. 89

    Recent advances in hybrid metaheuristics for dataclustering

    Published 2020
    Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- List of Contributors -- Series Preface -- Preface -- Chapter 1 Metaheuristic Algorithms in Fuzzy Clustering -- 1.1 Introduction -- 1.2 Fuzzy Clustering -- 1.2.1 Fuzzy c-means (FCM) clustering -- 1.3 Algorithm -- 1.3.1 Selection of Cluster Centers -- 1.4 Genetic Algorithm -- 1.5 Particle Swarm Optimization -- 1.6 Ant Colony Optimization -- 1.7 Artificial Bee Colony Algorithm -- 1.8 Local Search-Based Metaheuristic Clustering Algorithms -- 1.9 Population-Based Metaheuristic Clustering Algorithms -- 1.9.1 GA-Based Fuzzy Clustering…”
    Full text (MFA users only)
    Electronic eBook
  10. 90

    Machine Learning with Scikit-Learn Quick Start Guide : Classification, Regression, and Clustering Techniques in Python. by Jolly, Kevin

    Published 2018
    Table of Contents: “…Chapter 2: Predicting Categories with K-Nearest NeighborsTechnical requirements; Preparing a dataset for machine learning with scikit-learn; Dropping features that are redundant; Reducing the size of the data; Encoding the categorical variables; Missing values; The k-NN algorithm; Implementing the k-NN algorithm using scikit-learn; Splitting the data into training and test sets; Implementation and evaluation of your model; Fine-tuning the parameters of the k-NN algorithm; Scaling for optimized performance; Summary; Chapter 3: Predicting Categories with Logistic Regression.…”
    Full text (MFA users only)
    Electronic eBook
  11. 91

    Topology and robotics : July 10-14, 2006, FIM ETH, Zurich

    Published 2007
    Table of Contents: “…Farber, M. Grant and S. Yuzvinsky -- Symmetric motion planning / M. …”
    Full text (MFA users only)
    Electronic eBook
  12. 92
  13. 93

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  14. 94

    Advances in Computational Intelligence : Theory & Applications by Wang, Fei-Yue

    Published 2006
    Table of Contents: “…Lin and F.-Y. Wang -- 8. Ant colony algorithms: the state-of-the-art / J. …”
    Full text (MFA users only)
    Electronic eBook
  15. 95

    Industrial control systems

    Published 2011
    Table of Contents: “…INTELLIGENT CONTROL SYSTEM FOR AN INDUSTRIAL MANIPULATORAbstract; 1Introduction; 2AdaptiveLearningTechniqueforLarge-ScaleTeachingSignals; 2.1Background; 2.2Model-basedroboticservosystem; 2.2.1Computedtorquecontrolmethod; 2.2.2TeachingsignalforRNN; 2.3Independentrecurrentneuralnetworksforanindustrialrobotwithsixjoints; 2.3.1AdaptivelearningofRNNs; 2.3.2LearningresultsofRNNs; 2.4AdvancedservosystemusingintegratedRNNs; 3FineGainTuningforModel-BasedRoboticServoControllersUsingGeneticAlgorithms; 3.1Background; 3.2RoboticServoController; 3.2.1ResolvedAccelerationControl.…”
    Full text (MFA users only)
    Electronic eBook
  16. 96

    Optimization of Logistics. by Yalaoui, Alice

    Published 2012
    Table of Contents: “…2.4.1. Genetic algorithms2.4.2. Ant colonies; 2.4.3. Tabu search; 2.4.4. …”
    Full text (MFA users only)
    Electronic eBook
  17. 97

    Modeling Reality : How Computers Mirror Life. by Białynicki-Birula, Iwo

    Published 2004
    Table of Contents: “…Contents; 1 From building blocks to computers: Models and modeling; 2 The game of life: A legendary cellular automaton; 3 Heads or tails: Probability of an event; 4 Galton's board: Probability and statistics; 5 Twenty questions: Probability and information; 6 Snowflakes: The evolution of dynamical systems; 7 The Lorenz butterfly: Deterministic chaos; 8 From Cantor to Mandelbrot: Self-similarity and fractals; 9 Typing monkeys: Statistical linguistics; 10 The bridges of Königsberg: Graph theory; 11 Prisoner's dilemma: Game theory; 12 Let the best man win: Genetic algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  18. 98

    Advances in intelligent IT : active media technology 2006

    Published 2006
    Table of Contents: “…Title page; Preface; Organization; Contents; Keynotes; Active Media Technologies (AMT) from the Standpoint of the Wisdom Web; Anytime Learning and Classification for Online Applications; Domain-Driven Data Mining: Methodologies and Applications; Regular Papers; Web Service Request Transformatter; A Head-Tracker Based on the Lucas-Kanade Optical Flow Algorithm; A Fair Peer Selection Algorithm for an Ecommerce-Oriented Distributed Recommender System; Intelligent Decision Making with the Semantic Web; Relevence Assessment of Topic Ontology; Information Extraction from a Whole Web Site.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 99

    Information technology applications in industry III : selected, peer reviewed papers from the 2014 3rd International Conference on Information Technology and Management Innovation...

    Published 2014
    Table of Contents: “…A Hybrid Simulate Annealing Algorithm Based on Aircraft Emergency Dispatching SystemA Variable Step-Size BLMS Adaptive Jamming Cancellation Algorithm Based on FFT; Adaptive Extended Kalman Filter for Nonlinear System with Noise Compensating Technology; An Improvement of Apriori Algorithm in Medical Data Mining; An Integrated Algorithm for Low-Carbon City Evaluation Based on Neural Network and Analytic Hierarchy Process; Reliability Optimization for Multi-State Series-Parallel System Design Using Ant Colony Algorithm…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 100

    Integration of swarm intelligence and artificial neural network

    Published 2011
    Table of Contents: “…Dehuri -- Coherent biclusters of microarray data by imitating the ecosystem : an ant colony algorithmic approach / D. Mishra, A.K. …”
    Full text (MFA users only)
    Electronic eBook