Search Results - (((((((ant OR mantis) OR antiii) OR granting) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 161

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  2. 162

    Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...

    Published 2013
    Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 163

    Deep Learning Quick Reference : Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras. by Bernico, Michael

    Published 2018
    Table of Contents: “…Drawbacks to consider when using a neural network for regressionUsing deep neural networks for regression; How to plan a machine learning problem; Defining our example problem; Loading the dataset; Defining our cost function; Building an MLP in Keras; Input layer shape; Hidden layer shape; Output layer shape; Neural network architecture; Training the Keras model; Measuring the performance of our model; Building a deep neural network in Keras; Measuring the deep neural network performance; Tuning the model hyperparameters; Saving and loading a trained Keras model; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  5. 165
  6. 166

    Solutions in lidar profiling of the atmosphere by Kovalev, Vladimir A.

    Published 2015
    Table of Contents: “…1.6.1 Algorithm and Solution Uncertainty1.6.2 Numerical Simulations and Experimental Data; 1.7 Examination of the Remaining Offset in the Backscatter Signal by~Analyzing the Shape of the Integrated Signal; 1.8 Issues in the Examination of the Lidar Overlap Function; 1.8.1 Influence of Distortions in the Lidar Signal when Determining the~Overlap Function; 1.8.2 Issues of Lidar Signal Inversion within the Incomplete Overlap Area; Chapter 2 Essentials and Issues in Separating the Backscatter and Transmission Terms in The Lidar Equation.…”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Computational intelligence in aerospace sciences

    Published 2014
    Table of Contents: “…Guenov, Mrco Nunez, Arturo Molina-Cristóbal, Vis Sripawadkul, varun Datta and Atif Riaz ; Surrogate modeling in the service of multidisciplinary design / Stephen Powell and András Sóbester ; Multidisciplinary design optimization of aerospace transportation systems / Edmondo Minisci and Massimilliano Vasile -- Aerodynamics optimization: Aerodynamic shape design using evolutionary computation : a tutorial with examples and case studies / Domenico Quagliarella ; Multiobjective design optimization using Nash games / Jean-Antoine Désidéri and Régis Duvigneau ; Design rule extraction using multiobjective design exploration / Shigeru Obayashi -- Space trajectory design: Automated interplanetary mission planning / Jacob Englander and Bruce Conway ; On the global optimization of multigravity assist trajectories with evolutionary algorithms / Massimilliano Vasile and Edmondo Minisci, Marco Locatelli ; An incremental algorithm for the optimization of multiple gravity assist trajectories / Massimilliano Vasile, Matteo Ceriotti, Victor M. …”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Parts-feeding systems for assembly : organisation, logistics and automation

    Published 2015
    Table of Contents: “…A model for kitting operations planningRobust optimization approach to production system with failure in rework and breakdown under uncertainty: evolutionary methods; Re-layout of an assembly area: a case study at Bosch Rexroth Oil Control; A simple mechanical measurement system for the posture evaluation of wing components using the PSO and ICP algorithms; Implementation framework for a fully flexible assembly system (F-FAS); A genetic algorithm for supermarket location problem; New Kanban model for tow-train feeding system design.…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    3D face modeling, analysis and recognition by Daoudi, Mohamed, Ph. D., Srivastava, Anuj, Veltkamp, Remco C., 1963-

    Published 2013
    Table of Contents: “…3.5.4 Extension to Facial Surfaces Shape Analysis3.6 The Dense Scalar Field (DSF); 3.7 Statistical Shape Analysis; 3.7.1 Statistics on Manifolds: Karcher Mean; 3.7.2 Learning Statistical Models in Shape Space; 3.8 Applications of Statistical Shape Analysis; 3.8.1 3D Face Restoration; 3.8.2 Hierarchical Organization of Facial Shapes; 3.9 The Iso-geodesic Stripes; 3.9.1 Extraction of Facial Stripes; 3.9.2 Computing Relationships between Facial Stripes; 3.9.3 Face Representation and Matching Using Iso-geodesic Stripes; Exercises; Glossary; References.…”
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Wavelet theory approach to pattern recognition

    Published 2009
    Table of Contents: “…Comparison with other wavelets. 7.4. Algorithm and experiments -- ch. 8. Skeletonization of ribbon-like shapes with new wavelet function. 8.1. …”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    The Finite Element Method : a Practical Course. by Liu, G. R.

    Published 2013
    Table of Contents: “…3.4.3.3 On other means of construct shape functions3.4.4 Properties of the shape functions; 3.4.5 Formulation of finite element equations in local coordinate system; 3.4.6 Coordinate transformation; 3.4.7 Assembly of global FE equation; 3.4.8 Imposition of displacement constraints; 3.4.9 Solving the global FE equation; 3.5 Static analysis; 3.6 Analysis of free vibration (eigenvalue analysis); 3.7 Transient response; 3.7.1 Central difference algorithm; 3.7.2 Newmark's method (Newmark, 1959); 3.8 Remarks; 3.8.1 Summary of shape function properties.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015

    Published 2015
    Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 173

    An introduction to computational engineering with Matlab by Yang, Xin-She

    Published 2006
    Table of Contents: “…Optimization in Engineering -- 12.1 Introduction -- 12.2 Bioinspired Algorithms -- 12.2.1 Genetic Algorithms -- 12.2.2 Neural Networks…”
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Optimization advances in electric power systems

    Published 2008
    Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Integrated and collaborative product development environment : technologies and implementations by Li, W. D.

    Published 2006
    Table of Contents: “…Intelligent Optimisation of Process Planning; 5.1 Intelligent Optimisation Strategies for CAPP Systems; 5.2 Knowledge Representation of Process Plans; 5.2.1 Process plan representation; 5.2.2 Machining cost criteria for process plans; 5.2.3 Precedence constraints; 5.3 A Hybrid GA/SA-based Optimisation Method; 5.3.1 Overview of the algorithm; 5.3.2 Genetic algorithm -- phase 1; 5.3.3 Simulated annealing algorithm -- phase 2; 5.3.4 Constraint handling algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Deep Learning with TensorFlow : Explore neural networks and build intelligent systems with Python, 2nd Edition. by Zaccone, Giancarlo

    Published 2018
    Table of Contents: “…; Artificial neural networks; The biological neurons; The artificial neuron; How does an ANN learn?; ANNs and the backpropagation algorithm; Weight optimization; Stochastic gradient descent; Neural network architectures; Deep Neural Networks (DNNs); Multilayer perceptron; Deep Belief Networks (DBNs).…”
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Seismic Data Interpretation using Digital Image Processing by Al-Shuhail, Abdullatif A., Al-Dossary, Saleh A., Mousa, Wail A.

    Published 2017
    Table of Contents: “…5.5 Two-Dimensional Second-Order Derivative Operator5.5.1 The Coherence Attribute; 5.5.2 The Dip Attribute; 5.6 The Curvature Attribute; 5.7 Curvature of the Surface; 5.7.1 Curve, Velocity, and Curvature; 5.7.2 Surface, Tangent Plane, and Norm; 5.8 Shape Operator, Normal Curvature, and Principal Curvature; 5.8.1 Normal Curvature; 5.8.2 Shape Operator; 5.8.3 The Principal Curvatures; 5.8.4 Calculation of the Principal Curvatures; 5.8.5 Summary of Calculation of Principal Curvature for a Surface; 5.9 The Randomness Attribute; 5.10 Technique for Two-Dimensional Images.…”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Revolutionary routines : the habits of social transformation by Pedwell, Carolyn

    Published 2021
    Full text (MFA users only)
    Electronic eBook