Search Results - (((((((ant OR wanti) OR semantic) OR mind) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 141

    Handbook of Mathematical Induction. by Gunderson, David S.

    Published 2014
    Table of Contents: “…Chapter 14: Logic and languageChapter 15: Graphs; Chapter 16: Recursion and algorithms; Chapter 17: Games and recreations; Chapter 18: Relations and functions; Chapter 19: Linear and abstract algebra; Chapter 20: Geometry; Chapter 21: Ramsey theory; Chapter 22: Probability and statistics; Part III: Solutions and hints to exercises; Chapter 23: Solutions: Foundations; Chapter 24: Solutions: Inductive techniques applied to the infinite; Chapter 25: Solutions: Paradoxes and sophisms; Chapter 26: Solutions: Empirical induction; Chapter 27: Solutions: Identities.…”
    Full text (MFA users only)
    Electronic eBook
  2. 142

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 143

    Cybernetic intelligent systems

    Published 2014
    Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
    Full text (MFA users only)
    Electronic eBook
  4. 144

    Text mining : applications and theory

    Published 2010
    Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 145

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007

    Published 2007
    Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 147

    Information modelling and knowledge bases XXX

    Published 2019
    Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 148

    Metaheuristics for intelligent electrical networks by Héliodore, Frédéric, Nakib, Amir, Ismail, Boussaad, Ouchraa, Salma, Schmitt, Laurent

    Published 2017
    Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
    Full text (MFA users only)
    Electronic eBook
  9. 149

    Introduction to identity-based encryption by Martin, Luther

    Published 2008
    Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
    Full text (MFA users only)
    Electronic eBook
  10. 150

    Advanced Artificial Intelligence.

    Published 2011
    Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
    Full text (MFA users only)
    Electronic eBook
  11. 151
  12. 152

    Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)

    Published 2007
    Table of Contents: “…Cover; CONTENTS; EDITORIAL ADVISORY BOARD; The digital information war; Complementing DRM with digital watermarking: mark, search, retrieve; A class of non-linear asymptotic fingerprinting codes with 1-error; Verification algorithms for governed use of multimedia content; Toward semantics-aware management of intellectual property rights; DRM, law and technology: an American perspective; Clustering search results. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 153

    What Every Teacher Should Know About Effective Teaching Strategies. by Tileston, Donna E. Walker

    Published 1900
    Table of Contents: “…-- Why the Way We Teach is Important -- The Linguistic Modality -- The Nonlinguistic Modality -- The Affective Modality -- Semantic Memory -- Episodic Memory -- Procedural Memory -- Automatic Memory -- Emotional Memory -- Chapter 2 -- Choosing Effective Teaching Strategies for Beginning Activities -- Great Beginnings -- The Self-System…”
    Full text (MFA users only)
    Electronic eBook
  14. 154

    New autonomous systems by Cardon, Alain, 1946-, Itmi, Mhamed

    Published 2016
    Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
    Full text (MFA users only)
    Electronic eBook
  15. 155

    3D Shape Analysis : Fundamentals, Theory and Applications. by Tabia, Hedi

    Published 2018
    Table of Contents: “…7.2 Problem Formulation7.3 Mathematical Tools; 7.4 Isometric Correspondence and Registration; 7.5 Nonisometric (Elastic) Correspondence and Registration; 7.6 Summary and Further Reading; 8 Semantic Correspondences; 8.1 Introduction; 8.2 Mathematical Formulation; 8.3 Graph Representation; 8.4 Energy Functions for Semantic Labeling; 8.5 Semantic Labeling; 8.6 Examples; 8.7 Summary and Further Reading; Part IV: Applications; 9 Examples of 3D Semantic Applications; 9.1 Introduction; 9.2 Semantics: Shape or Status; 9.3 Semantics: Class or Identity; 9.4 Semantics: Behavior; 9.5 Semantics: Position…”
    Full text (MFA users only)
    Electronic eBook
  16. 156

    OIPE 2012

    Published 2014
    Table of Contents: “…N-level output space mapping for electromagnetic design optimizationHigh-speed functionality optimization of five-phase PM machine using third harmonic current; Topology optimization of magnetostatic shielding using multistep evolutionary algorithms with additional searches in a restricted design space ; Adaptive unscented transform for uncertainty quantification in EMC large-scale systems; Ant colony optimization for the topological design of interior permanent magnet (IPM)machines; Multiobjective approach developed for optimizing the dynamic behavior of incremental linear actuators.…”
    Full text (MFA users only)
    Electronic eBook
  17. 157

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  18. 158

    Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals by Burkhardt, Joanna M.

    Published 2022
    Table of Contents: “…Words matter -- Propaganda -- Satire -- Advertising -- Public trust in journalism -- 7. Algorithms, Bots, Trolls, Cyborgs and Artificial Intelligence -- Algorithms -- Bots, trolls, cyborgs and other inauthentic activity -- 8. …”
    Full text (MFA users only)
    Electronic eBook
  19. 159

    Data Analytics Applied to the Mining Industry. by Soofastaei, Ali

    Published 2020
    Table of Contents: “…Advanced Data Analytics -- Introduction -- Big Data -- Analytics -- Deep Learning -- CNNs -- Deep Neural Network -- Recurrent Neural Network (RNN) -- ML -- Fuzzy Logic -- Classification Techniques -- Clustering -- Evolutionary Techniques -- Genetic Algorithms (GAs) -- Ant Colony Optimization (ACO)…”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Language engineering for lesser-studied languages

    Published 2009
    Table of Contents: “…Derzhanski -- Computational morphology for lesser-studied languages / Kemal Olfazer -- Practical syntastic processing of flexible word order languages with dynamic syntax / David Tugwell -- Computation field semantics : acquiring an ontological-semantic lexicon for a new language / Sergei Nirenburg and Marjorie McShane -- Applying machine translation for low- and middle-density languages / Stella Markantonatou [and others] -- Language resources for semitic languages : challenges and solutions / Shuly Wintner -- Low-density language strategies for Persian and Armenian / Karine Megerdoomian.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook