Search Results - (((((((ant OR want) OR semantic) OR arte) OR cantor) OR anne) OR maarten) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 52
- Artificial intelligence 47
- Mathematical models 44
- Machine learning 36
- Mathematics 29
- Data mining 27
- Mathematical optimization 27
- artificial intelligence 25
- Computer networks 18
- Artificial Intelligence 17
- Computer science 15
- Data Mining 15
- Python (Computer program language) 15
- Algorithms 14
- Technological innovations 14
- Information technology 13
- Computer simulation 12
- Machine Learning 12
- Management 12
- Neural networks (Computer science) 12
- algorithms 12
- Big data 11
- Development 11
- Digital techniques 11
- History 11
- Security measures 11
- Application software 10
- Bioinformatics 10
- Computational linguistics 10
- Electronic data processing 10
Search alternatives:
- ant »
- want »
- semantic »
- cantor »
- mantis »
- arte »
- maarten »
-
201
-
202
-
203
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
204
Experiencing architecture in the nineteenth century : buildings and society in the modern age
Published 2019Table of Contents: “…Chapter 3: Architecture of the mind: Imparting Californian identity through architectural experience on the early Stanford University campusThe art museum at the heart of the university; Memorial Church: Moulding the spirit through art; The partial destruction of the campus and its legacy in American design; Chapter 4: The architecture of art education: Provincial art schools in Britain, 1850-1914; Chapter 5: Rooms and galleries: Spaces of art in the nineteenth century; The experience of the museum; The experience of the private collection.…”
Full text (MFA users only)
Electronic eBook -
205
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
206
Mastering D3.js.
Published 2014Table of Contents: “…Updating the datasetFixing the enter and exit transitions; Using the barcode chart; Creating a layout algorithm; The radial layout; Computing the angles; Using the layout; Summary; Chapter 3: Creating Visualizations without SVG; SVG support in the browser market; Visualizations without SVG; Loading and sorting the data; The force layout method; Setting the color and size; Creating a legend; Polyfilling; Feature detection; The canvg example; Using canvas and D3; Creating figures with canvas; Creating shapes; Integrating canvas and D3; Summary; Chapter 4: Creating a Color Picker with D3.…”
Full text (MFA users only)
Electronic eBook -
207
Metaheuristics for vehicle routing problems.
Published 2015Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
Full text (MFA users only)
Electronic eBook -
208
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
209
Communicating process architectures 2002.
Published 2002Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
Full text (MFA users only)
Electronic eBook -
210
Polynomial root-finding and polynomiography
Published 2009Table of Contents: “…Approximation of square-roots and their visualizations -- The fundamental theorem of algebra and a special case of Taylor's theorem -- Introduction to the basic family and polynomiography -- Equivalent formulations of the basic family -- Basic family as dynamical system -- Fixed points of the basic family -- Algebraic derivation of the basic family and characterizations -- The truncated basic family and the case of Halley family -- Characterizations of solutions of homogeneous linear recurrence relations -- Generalization of Taylor's theorem and Newton's method -- The multipoint basic family and its order of convergence -- A computational study of the multipoint basic family -- A general determinantal lower bound -- Formulas for approximation of pi based on root-finding algorithms -- Bounds on roots of polynomials and analytic functions -- A geometric optimization and its algebraic offsprings -- Polynomiography : algorithms for visualization of polynomial equations -- Visualization of homogeneous linear recurrence relations -- Applications of polynomiography in art, education, science, and mathematics -- Approximation of square-roots revisited -- Further applications and extensions of the basic family and polynomiography.…”
Full text (MFA users only)
Electronic eBook -
211
Learning-based local visual representation and indexing
Published 2014Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
Full text (MFA users only)
Electronic eBook -
212
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
213
Automatic Text Summarization
Published 2014Table of Contents: “…Machine learning approaches; 3.3. State-of-the-art approaches; 3.4. Latent semantic analysis; 3.5. …”
Full text (MFA users only)
Electronic eBook -
214
Mathematical morphology and its applications to image and signal processing
Published 2000Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
215
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
216
Java programming interviews exposed
Published 2014Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
Full text (MFA users only)
Electronic eBook -
217
Optimization techniques and applications with examples
Published 2018Full text (MFA users only)
Electronic eBook -
218
Pattern discovery in biomolecular data : tools, techniques, and applications
Published 1999Table of Contents: “…Discovering patterns in DNA sequences by the algorithmic significance method / Aleksandar Milosavljevic -- Assembling blocks / Jorja G. …”
Full text (MFA users only)
Electronic eBook -
219
-
220
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Table of Contents: “…Wiley Series; Title Page; Copyright; Table of Contents; List of Contributors; Preface; Part 1: Pattern Recognition in Sequences; Chapter 1: Combinatorial Haplotyping Problems; 1.1 Introduction; 1.2 Single Individual Haplotyping; 1.3 Population Haplotyping; References; Chapter 2: Algorithmic Perspectives of the String Barcoding Problems; 2.1 Introduction; 2.2 Summary of Algorithmic Complexity Results for Barcoding Problems; 2.3 Entropy-Based Information Content Technique for Designing Approximation Algorithms for String Barcoding Problems.…”
Full text (MFA users only)
Electronic eBook