Search Results - (((((((ant OR wantis) OR semantic) OR kind) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 41
- Artificial intelligence 39
- Mathematics 38
- Mathematical models 32
- Algorithms 23
- Machine learning 20
- algorithms 20
- Mathematical optimization 19
- artificial intelligence 18
- Computer science 16
- Data mining 15
- Information technology 15
- Computer networks 13
- Technological innovations 13
- Artificial Intelligence 11
- Computer algorithms 11
- Neural networks (Computer science) 11
- Social aspects 10
- Computer simulation 9
- Digital techniques 9
- Electronic data processing 9
- Image processing 9
- Management 9
- Materials 9
- Automatic control 8
- Computational linguistics 8
- Data Mining 8
- Design and construction 8
- Inverse problems (Differential equations) 8
- Numerical solutions 8
Search alternatives:
- ant »
- wantis »
- semantic »
- cantor »
- kind »
- plane »
-
201
Direct Eigen Control for Induction Machines and Synchronous Motors.
Published 2012Full text (MFA users only)
Electronic eBook -
202
CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).
Published 2018Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
Full text (MFA users only)
Electronic eBook -
203
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
204
Generative design
Published 2015Table of Contents: “…Intro; 1.0 Introduction to Generative Design; 2.0 Continuous Surfaces; 3.0 Modularity and Accumulation; 4.0 Deformation and Subtraction; 5.0 Algorithmic Patterns; 6.0 Triangulation ; 7.0 Conclusion: The Digital Vs Physical Debate ; Bibliography ; Index; Picture Credits; Acknowledgements; 1.1 Design methods in architecture: A brief review; 1.2 Generative form-finding processes; 1.3 The approach of this book; 2.1 Soft mesh; 2.2 Double-curved shells; 2.3 Hyper paraboloids; 3.1 Interlocking units; 3.2 Irregular units; 4.1 Twisted block; 4.2 Porous space; 5.1 Tessellated planes…”
Full text (MFA users only)
Electronic eBook -
205
Inverse problems of vibrational spectroscopy
Published 1999Table of Contents: “…Angle between a bond and the plane of an atomic triple -- 4.3.5. Angle between two planes (torsion coordinate) -- 4.3.6. …”
Full text (MFA users only)
Electronic eBook -
206
Analysis of biological data : a soft computing approach
Published 2007Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
Full text (MFA users only)
Electronic eBook -
207
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
208
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
209
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
210
Advances in structures analysis : special topic volume with invited peer reviewed papers only
Published 2011Full text (MFA users only)
Electronic eBook -
211
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
212
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
213
Handbook on semidefinite, conic and polynomial optimization
Published 2012Table of Contents: “…Lasserre and Mihai Putinar -- Self-regular interior-point methods for semidefinite optimization / Maziar Salahi and Tamás Terlaky -- Elementary optimality conditions for nonlinear SDPs / Florian Jarre -- Recent progress in interior-point methods: cutting-plane algorithms and warm starts / Alexander Engau -- Exploiting sparsity in SDP relaxation of polynomial optimization problems / Sunyoung Kim and Masakazu Kojima -- Block coordinate descent methods for semidefinite programming / Zaiwen Wen, Donald Goldfarb, and Katya Scheinberg -- Projection methods in conic optimization / Didier Henrion and Jérôme Malick -- SDP relaxations for non-commutative polynomial optimization / Miguel Navascués, Stefano Pironio, and Antonio Acín -- Semidefinite programming and constraint programming / Willem-Jan van Hoeve -- The state-of-the-art in conic optimization software / Hans D. …”
Full text (MFA users only)
Electronic eBook -
214
Digital Signal Processing and Applications with the OMAP - L138 EXperimenter.
Published 2012Table of Contents: “…5.2 Development of the FFT Algorithm with Radix-2 -- 5.3 Decimation-In-Frequency FFT Algorithm with Radix-2 -- 5.4 Decimation-In-Time FFT Algorithm with RADIX-2 -- 5.4.1 Reordered Sequences in the Radix-2 FFT and Bit-Reversed Addressing -- 5.5 Decimation-In-Frequency FFT Algorithm with Radix-4 -- 5.6 Inverse Fast Fourier Transform -- 5.7 Programming Examples Using C Code -- 5.7.1 Frame- or Block-Based Processing -- 5.7.2 Fast Convolution -- References -- 6. …”
Full text (MFA users only)
Electronic eBook -
215
-
216
Theory of linear ill-posed problems and its applications
Published 2002Table of Contents: “…Basic techniques for constructing regularizing algorithms -- 3.1. Reduction to operator equations of the second kind -- 3.2. …”
Full text (MFA users only)
Electronic eBook -
217
Rarefied Gas Dynamics : Theory and Simulations.
Published 2000Table of Contents: “…Mathematical Techniques""; ""Plane Waves in a Multispeed Discrete Velocity Gas""; ""Fluctuations for a Many-Particle System""; ""Deterministic Method for Solving the Boltzmann Equation""; ""Implicit Methods for Kinetic Equations""; ""Theoretical Comparison of Stochastic Particle Methods in Rarefied Gas Dynamics""…”
Full text (MFA users only)
Electronic eBook -
218
Advances in intelligent structure and vibration control : selected, peer reviewed papers from the International Conference on Intelligent Structure and Vibration Control (ISVC 2012...
Published 2012Table of Contents: “…Influences of Heat Treatment on Spinning Process with Large Thinning Rate and Performance of 30CrMnSiAThe DNA Genetic Algorithm Applied for Solving Optimal Placement of Sensors; Research on an Improved Cellular Automata Model; Control Algorithm Research of Electric Actuator Based on Switched Reluctance Motor; Study on Structure Including Interface Based on Interface Stress Element Method; A Probability Assessment Method for Degradation of Bridge Power MOSFET Circuit Based on Common Turn-On State…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
219
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
220
Metaheuristics for vehicle routing problems.
Published 2015Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
Full text (MFA users only)
Electronic eBook