Search Results - (((((((ant OR pantsa) OR semantic) OR west) OR cantor) OR anne) OR line) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 52
- Artificial intelligence 42
- Mathematics 36
- Mathematical models 30
- Mathematical optimization 28
- Machine learning 24
- Algorithms 21
- artificial intelligence 21
- Data mining 20
- Technological innovations 20
- methods 20
- algorithms 19
- Python (Computer program language) 15
- Artificial Intelligence 13
- Information technology 13
- Computer networks 12
- Computer science 12
- Digital techniques 12
- Research 12
- Computer algorithms 11
- Design and construction 11
- History 11
- Signal processing 11
- Automatic control 10
- Computer simulation 10
- Diseases 10
- Management 10
- Automation 9
- Data Mining 9
- Electromagnetism 9
Search alternatives:
- ant »
- pantsa »
- semantic »
- cantor »
- line »
-
41
Standard colorimetry : definitions, algorithms, and software
Published 2016Full text (MFA users only)
Electronic eBook -
42
Non-line-of-sight radar
Published 2019Table of Contents: “…5.2 Diffraction -- 5.2.1 KED -- 5.2.2 UTD -- 5.3 SEKE -- 5.4 Radar Simulations Using Elliptical C -- 5.5 Commercial Software -- References -- 6 Computing Hardware Acceleration Strategi -- 6.1 GPU Computational Model -- 6.2 GPU Programming -- 6.3 FPGA -- 6.4 Ray-Tracing Line-of-Sight Algorithms -- 6.4.1 Shapes and Ray Intersections -- 6.4.2 Intersection Acceleration Algorith -- 6.5 GPU Ray-Tracing Example -- 6.6 FPGA Ray Tracing -- References -- About the Authors -- Index.…”
Full text (MFA users only)
Electronic eBook -
43
Deep Learning for the Earth Sciences : A Comprehensive Approach to Remote Sensing, Climate Science and Geosciences.
Published 2021Table of Contents: “…6.1.4 Evaluation Metrics -- 6.1.4.1 Precision-Recall Curve -- 6.1.4.2 Average Precision and Mean Average Precision -- 6.1.5 Applications -- 6.2 Preliminaries on Object Detection with Deep Models -- 6.2.1 Two-stage Algorithms -- 6.2.1.1 R-CNNs -- 6.2.1.2 R-FCN -- 6.2.2 One-stage Algorithms -- 6.2.2.1 YOLO -- 6.2.2.2 SSD -- 6.3 Object Detection in Optical RS Images -- 6.3.1 Related Works -- 6.3.1.1 Scale Variance -- 6.3.1.2 Orientation Variance -- 6.3.1.3 Oriented Object Detection -- 6.3.1.4 Detecting in Large-size Images -- 6.3.2 Datasets and Benchmark -- 6.3.2.1 DOTA -- 6.3.2.2 VisDrone…”
Full text (MFA users only)
Electronic eBook -
44
Uberland : how algorithms are rewriting the rules of work
Published 2018Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
Full text (MFA users only)
Electronic eBook -
45
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
46
Fundamentals of grid computing : theory, algorithms and technologies
Published 2010Full text (MFA users only)
Electronic eBook -
47
Romance syntax, semantics and L2 acquisition : selected papers from the 30th Linguistic Symposium on Romance Languages : Gainesville, Florida, February 2000
Published 2001Table of Contents: “…ROMANCE SYNTAX, SEMANTICS AND L2 ACQUISITION -- Editorial page -- Title page -- Copyright page -- Acknowledgements -- Table of contents -- CONTRIBUTORS -- Dedication -- ROMANCE SYNTAX, SEMANTICS, AND L2 ACQUISITION -- 0. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
48
Scheduling in supply chains using mixed integer programming
Published 2011Full text (MFA users only)
Electronic eBook -
49
-
50
Abelian coverings of the complex projective plane branched along configurations of real lines
Published 1993Full text (MFA users only)
Electronic eBook -
51
Entity information life cycle for big data : master data management and information integration
Published 2015Full text (MFA users only)
Electronic eBook -
52
-
53
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
54
Naming and reference : the link of word to object
Published 1992Table of Contents: “…Nativism and causal reference -- CHAPTER 9 Mechanism -- 1. Top-down semantics -- 2. Up from reference -- 3. Algorithms: free and embodied -- 4. …”
Full text (MFA users only)
Electronic eBook -
55
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.…”
Full text (MFA users only)
Electronic eBook -
56
Stochastic processes in polymeric fluids : tools and examples for developing simulation algorithms
Published 1996Full text (MFA users only)
Electronic eBook -
57
-
58
Adventures in Raspberry Pi
Published 2017Table of Contents: “…Twinkle Twinkle Little Star -- Repeating Lines in a Loop -- First Electronic Track -- Using Different Synthesizer Sounds -- Using Prerecorded Samples -- Creating a Surprising Tune -- Using "rand" to Play Random Notes -- Using Algorithms -- Running Two Scripts at the Same Time -- Adding Effects -- Making a Recording of Your Music -- Further Adventures with Sonic Pi -- Adventure 8 Using the GPIO Pins on the Raspberry Pi -- Using a Raspberry Pi GPIO Pin Layout Diagram -- Electronics Basics -- Using a Python Library to Control GPIO -- Making an LED Blink -- Creating the LEDblink Python Code -- Connecting the LEDblink Components -- Running LEDblink.py in IDLE -- Using a Button to Turn on an LED -- Creating the buttonLED Python Code -- Connecting the buttonLED Components -- Running buttonLED.py in IDLE -- Using a PIR Motion Sensor to Trigger a Sound -- Creating the Motion-Sensing Python Code -- Connecting the PIRmotion Components -- Running PIRmotion.py in IDLE -- The Marshmallow Challenge -- Creating the Marshmallow Button -- Mapping Marshmallow Input to a Keyboard Key -- Scratch Marshmallow Game -- Further Adventures with GPIO Pins -- Adventure 9 Experimenting with Cameras and HATs -- Getting Started with the Raspberry Pi Camera -- Connecting the Camera to Your Raspberry Pi -- Programming the Picamera with Python -- Creating a Time-Lapse Photography Program -- Mounting Your Camera -- Making a Movie of Your Images -- Getting Started with the Explorer HAT Pro -- Connecting the HAT to Your Raspberry Pi -- Downloading and Installing the Explorer HAT Library -- Programming the LEDs -- Programming the Touch Pads -- Creating an Explorer HAT Pro Disco Trigger Trap -- Creating the Disco Trigger Trap Python Code -- Making the Aluminum Foil Trap -- Getting Started with the Sense HAT -- Programming the LED Matrix with Python.…”
Full text (MFA users only)
Electronic eBook -
59
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
60
Architectures for computer vision : from algorithm to chip with Verilog
Published 2014Table of Contents: “…10.2 Belief in Pairwise MRF System -- 10.3 BP in Discrete Space -- 10.4 BP in Vector Space -- 10.5 Flow Network for Energy Function -- 10.6 Swap Move Algorithm -- 10.7 Expansion Move Algorithm -- Problems -- References -- Part Four Verilog Design -- 11 Relaxation for Stereo Matching -- 11.1 Euler-Lagrange Equation -- 11.2 Discretization and Iteration -- 11.3 Relaxation Algorithm for Stereo Matching -- 11.4 Relaxation Machine -- 11.5 Overall System -- 11.6 IO Circuit -- 11.7 Updation Circuit -- 11.8 Circuit for the Data Term -- 11.9 Circuit for the Differential -- 11.10 Circuit for the Neighborhood -- 11.11 Functions for Saturation Arithmetic -- 11.12 Functions for Minimum Argument -- 11.13 Simulation -- Problems -- References -- 12 Dynamic Programming for Stereo Matching -- 12.1 Search Space -- 12.2 Line Processing -- 12.3 Computational Space -- 12.4 Energy Equations -- 12.5 DP Algorithm -- 12.6 Architecture -- 12.7 Overall Scheme -- 12.8 FIFO Buffer -- 12.9 Reading and Writing -- 12.10 Initialization -- 12.11 Forward Pass -- 12.12 Backward Pass -- 12.13 Combinational Circuits -- 12.14 Simulation -- Problems -- References -- 13 Systolic Array for Stereo Matching -- 13.1 Search Space -- 13.2 Systolic Transformation -- 13.3 Fundamental Systolic Arrays -- 13.4 Search Spaces of the Fundamental Systolic Arrays -- 13.5 Systolic Algorithm -- 13.6 Common Platform of the Circuits -- 13.7 Forward Backward and Right Left Algorithm -- 13.8 FBR and FBL Overall Scheme -- 13.9 FBR and FBL FIFO Buffer -- 13.10 FBR and FBL Reading and Writing -- 13.11 FBR and FBL Preprocessing -- 13.12 FBR and FBL Initialization -- 13.13 FBR and FBL Forward Pass -- 13.14 FBR and FBL Backward Pass -- 13.15 FBR and FBL Simulation -- 13.16 Backward Backward and Right Left Algorithm -- 13.17 BBR and BBL Overall Scheme -- 13.18 BBR and BBL Initialization -- 13.19 BBR and BBL Forward Pass.…”
Full text (MFA users only)
Electronic eBook