Search Results - (((((((ant OR want) OR semantic) OR went) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 43
- Data processing 39
- Machine learning 30
- Mathematics 27
- Data mining 24
- Mathematical models 21
- artificial intelligence 21
- Mathematical optimization 19
- Technological innovations 19
- Algorithms 18
- Computer science 16
- algorithms 16
- Information technology 15
- Artificial Intelligence 14
- Computer networks 14
- Management 13
- Python (Computer program language) 13
- Big data 12
- Application software 11
- Data Mining 11
- Development 11
- Computer algorithms 10
- Neural networks (Computer science) 10
- Social aspects 10
- methods 10
- Machine Learning 9
- Computational linguistics 8
- Automatic control 7
- Computer programming 7
- Computer security 7
Search alternatives:
- ant »
- want »
- semantic »
- cantor »
- went »
- share »
-
141
Introduction to identity-based encryption
Published 2008Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
Full text (MFA users only)
Electronic eBook -
142
Insight into Theoretical and Applied Informatics : Introduction to Information Technologies and Computer Science.
Published 2015Table of Contents: “…1.2.7 Informatics and Economics1.3 Information Theory; 1.3.1 Quantities of Information; 1.3.1.1 Units for Measuring Computer Information; 1.3.1.2 Quantities of Information in Information Theory; 1.3.2 Coding Theory; 1.3.3 Semiotics; 1.3.3.1 Computational Semiotics; 2 Algorithmics; 2.1 The Science of Algorithms; 2.1.1 Algorithm Design; 2.1.2 Algorithmic Complexity Theory; 2.1.3 Algorithm Analysis; 2.2 Data Science (Datalogy); 2.2.1 Raw Data; 2.2.2 Data Structures; 2.2.3 Data Analysis (Data Analytics); 2.2.4 Data Mining; 3 Computer Programming; 3.1 Computer Programming Languages.…”
Full text (MFA users only)
Electronic eBook -
143
Advanced Artificial Intelligence.
Published 2011Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
Full text (MFA users only)
Electronic eBook -
144
Emerging engineering approaches and applications : selected, peer reviewed papers from the 2011 International Conference on Information Engineering for Mechanics and Materials, Aug...
Published 2011Table of Contents: “…A Hierarchical Structure of Service-Oriented Manufacturing ModeStudy of Combination Algorithm in Partitioning Manufacture Technology; The Machinability of MAR-M247 Superalloy; Chapter 3: Computational Methods for Engineering; The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension; An Evaluation Survey of Score Normalization in Multibiometric Systems; Non-Line-of-Sight Error Mitigation in Wireless Communication Systems; Information Delay Protocol Using Non-Orthogonal Quantum States; A New Algorithm of Image Encryption Based on 3D Arnold Cat…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
145
-
146
FRBR, before and after : a look at our bibliographic models
Published 2016Full text (MFA users only)
Electronic eBook -
147
Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)
Published 2007Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
148
What Every Teacher Should Know About Effective Teaching Strategies.
Published 1900Table of Contents: “…-- Why the Way We Teach is Important -- The Linguistic Modality -- The Nonlinguistic Modality -- The Affective Modality -- Semantic Memory -- Episodic Memory -- Procedural Memory -- Automatic Memory -- Emotional Memory -- Chapter 2 -- Choosing Effective Teaching Strategies for Beginning Activities -- Great Beginnings -- The Self-System…”
Full text (MFA users only)
Electronic eBook -
149
New autonomous systems
Published 2016Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
Full text (MFA users only)
Electronic eBook -
150
3D Shape Analysis : Fundamentals, Theory and Applications.
Published 2018Table of Contents: “…7.2 Problem Formulation7.3 Mathematical Tools; 7.4 Isometric Correspondence and Registration; 7.5 Nonisometric (Elastic) Correspondence and Registration; 7.6 Summary and Further Reading; 8 Semantic Correspondences; 8.1 Introduction; 8.2 Mathematical Formulation; 8.3 Graph Representation; 8.4 Energy Functions for Semantic Labeling; 8.5 Semantic Labeling; 8.6 Examples; 8.7 Summary and Further Reading; Part IV: Applications; 9 Examples of 3D Semantic Applications; 9.1 Introduction; 9.2 Semantics: Shape or Status; 9.3 Semantics: Class or Identity; 9.4 Semantics: Behavior; 9.5 Semantics: Position…”
Full text (MFA users only)
Electronic eBook -
151
Numerical linear algebra with applications : using MATLAB
Published 2015Full text (MFA users only)
Electronic eBook -
152
OIPE 2012
Published 2014Table of Contents: “…N-level output space mapping for electromagnetic design optimizationHigh-speed functionality optimization of five-phase PM machine using third harmonic current; Topology optimization of magnetostatic shielding using multistep evolutionary algorithms with additional searches in a restricted design space ; Adaptive unscented transform for uncertainty quantification in EMC large-scale systems; Ant colony optimization for the topological design of interior permanent magnet (IPM)machines; Multiobjective approach developed for optimizing the dynamic behavior of incremental linear actuators.…”
Full text (MFA users only)
Electronic eBook -
153
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
154
Cybernetic Intelligence
Published 2005Table of Contents: “…Editorial advisory board; Preface; Editorial; Second-order cybernetics and enactive perception; Semantic category theory cognition and conceptual reference; Bipolar logic and probabilistic interpretation; Cooperative clans; Future reasoning machines: mind and body; Machine vision methods for autonomous micro-robotic systems; Optimisation enhancement using self-organising fuzzy control; Intelligent agents and distributed models for cooperative task support; Landscape classification and problem specific reasoning for genetic algorithms; Business cybernetics: a provocative suggestion.…”
Full text (MFA users only)
Electronic eBook -
155
Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals
Published 2022Table of Contents: “…Expertise, Authority and Credibility -- Experts -- Sharing information -- Evaluating information -- Authority -- How can authority be evaluated? …”
Full text (MFA users only)
Electronic eBook -
156
Data Analytics Applied to the Mining Industry.
Published 2020Table of Contents: “…Advanced Data Analytics -- Introduction -- Big Data -- Analytics -- Deep Learning -- CNNs -- Deep Neural Network -- Recurrent Neural Network (RNN) -- ML -- Fuzzy Logic -- Classification Techniques -- Clustering -- Evolutionary Techniques -- Genetic Algorithms (GAs) -- Ant Colony Optimization (ACO)…”
Full text (MFA users only)
Electronic eBook -
157
Language engineering for lesser-studied languages
Published 2009Table of Contents: “…Derzhanski -- Computational morphology for lesser-studied languages / Kemal Olfazer -- Practical syntastic processing of flexible word order languages with dynamic syntax / David Tugwell -- Computation field semantics : acquiring an ontological-semantic lexicon for a new language / Sergei Nirenburg and Marjorie McShane -- Applying machine translation for low- and middle-density languages / Stella Markantonatou [and others] -- Language resources for semitic languages : challenges and solutions / Shuly Wintner -- Low-density language strategies for Persian and Armenian / Karine Megerdoomian.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
158
Theory of information : fundamentality, diversity and unification
Published 2010Table of Contents: “…Algorithmic information theory based on recursive algorithms : recursive approach. 5.3. …”
Full text (MFA users only)
Electronic eBook -
159
-
160
Media technologies : essays on communication, materiality, and society
Published 2014Table of Contents: “…Bowker -- "What Do We Want?" "Materiality!" "When Do We Want It?" "Now!" …”
Full text (MFA users only)
Electronic eBook