Search Results - (((((((ant OR wanting) OR semantic) OR wind) OR ckantor) OR anne) OR planet) OR hints) algorithms.

  1. 161

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  2. 162

    Compressed sensing : theory and applications

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Hierarchical Protection for Smart Grids. by Ma, Jing

    Published 2018
    Table of Contents: “…3.3 Local Area Protection for Centralized Renewable Energy3.3.1 Connection Form of a Wind Farm and its Protection Configuration; 3.3.2 Adaptive Distance Protection Scheme for Wind Farm Collector Lines; 3.3.3 Differential Protection Scheme for Wind Farm Outgoing Transmission Line; 3.4 Local Area Protection for Distributed Renewable Energy; 3.4.1 Adaptive Protection Approach for a Distribution Network Containing Distributed Generation; 3.4.2 Islanding Detection Method; 3.5 Summary; References; Chapter 4 Topology Analysis; 4.1 Introduction; 4.2 Topology Analysis for the Inner Substation.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164
  5. 165

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Monte Carlo methods and applications : proceedings of the 8th IMACS Seminar on Monte Carlo Methods, August 29-September 2, 2011, Borovets, Bulgaria

    Published 2013
    Table of Contents: “…9.3 General Description of the Coupled Atmosphere Fire Modeling and WRF-Fire9.4 Wind Simulation Approach; 9.5 Conclusion; 10 Wireless Sensor Network Layout; 10.1 Introduction; 10.2 Wireless Sensor Network Layout Problem; 10.3 ACO for WSN Layout Problem; 10.4 Experimental Results; 10.5 Conclusion; 11 A Two-Dimensional Lorentzian Distribution for an Atomic Force Microscopy Simulator; 11.1 Introduction; 11.2 Modeling Oxidation Kinetics; 11.3 Development of the Lorentzian Model; 11.3.1 Algorithm for the Gaussian Model; 11.3.2 Development of the Lorentzian Model; 11.4 Conclusion.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 167

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Metaheuristics for vehicle routing problems. by Labadie, Nacima

    Published 2015
    Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  10. 170
  11. 171

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 173

    Automata and Computability. by Kozen, Dexter, 1951-

    Published 1997
    Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 175

    Learning-based local visual representation and indexing by Rongrong, Ji, Yao, Hongxun, Gao, Yue, Duan, Ling-Yu, Dai, Qionghai

    Published 2014
    Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
    Full text (MFA users only)
    Electronic eBook
  16. 176
  17. 177

    Bridge health monitoring, maintenance and safety : special topic volume with invited peer reviewed papers only

    Published 2011
    Table of Contents: “…Modal test and analysis of a bridge under the varying temperature condition -- Bridge significant failure mode identification strategy under traffic-load -- Fatigue reliability analysis of the stay cables of cable-stayed bridge under combined loads of stochastic traffic and wind -- Updating the finite element model of a bridge model using a hybrid optimization method -- An improved Taguchi method and its application in finite element model updating of bridges -- Nonlinear seismic response analysis of half through CFST arch bridge under 3-D earthquake waves -- Simplified seismic response assessment method and parametric study of multi-girder skew bridges -- Seismic testing of a long-span concrete filled steel tubular arch bridge -- Study on finite element model of bridge multi-pile foundation -- Sensor optimal placement for bridge structure based on single parents genetic algorithm with different fitness functions.…”
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Java programming interviews exposed by Markham, Noel

    Published 2014
    Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Pattern discovery in biomolecular data : tools, techniques, and applications

    Published 1999
    Table of Contents: “…Discovering patterns in DNA sequences by the algorithmic significance method / Aleksandar Milosavljevic -- Assembling blocks / Jorja G. …”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Selected papers from the 11th international symposium on electromagnetics fields in electrical engineering ISEF 2003 by Wiak, S.

    Published 2004
    Table of Contents: “…Finite element modelling of stacked thin regions with non-zero global currentsReliability-based topology optimization for electromagnetic systems; A "quasi-genetic" algorithm for searching the dangerous areas generated by a grounding system; Development of optimizing method using quality engineering and multivariate analysis based on finite element method; An improved fast method for computing capacitance; Power losses analysis in the windings of electromagnetic gear; Finite element analysis of the magnetorheological fluid brake transients; Magnetic stimulation of knee -- mathematical model…”
    Full text (MFA users only)
    Electronic eBook