Search Results - (((((((ant OR wants) OR semantic) OR find) OR cantor) OR anne) OR planet) OR hints) algorithms.

  1. 161

    Information technology applications in industry III : selected, peer reviewed papers from the 2014 3rd International Conference on Information Technology and Management Innovation...

    Published 2014
    Table of Contents: “…A Hybrid Simulate Annealing Algorithm Based on Aircraft Emergency Dispatching SystemA Variable Step-Size BLMS Adaptive Jamming Cancellation Algorithm Based on FFT; Adaptive Extended Kalman Filter for Nonlinear System with Noise Compensating Technology; An Improvement of Apriori Algorithm in Medical Data Mining; An Integrated Algorithm for Low-Carbon City Evaluation Based on Neural Network and Analytic Hierarchy Process; Reliability Optimization for Multi-State Series-Parallel System Design Using Ant Colony Algorithm…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 162

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 164

    What intelligence tests miss : the psychology of rational thought by Stanovich, Keith E., 1950-

    Published 2009
    Table of Contents: “…Inside George W. Bush's mind : hints at what IQ tests miss -- Dysrationalia : separating rationality and intelligence -- The reflective mind, the algorithmic mind, and the autonomous mind -- Cutting intelligence down to size -- Why intelligent people doing foolish things is no surprise -- The cognitive miser : ways to avoid thinking -- Framing and the cognitive miser -- Myside processing : heads I win, tails I win too! …”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Integration of swarm intelligence and artificial neural network

    Published 2011
    Table of Contents: “…Dehuri -- Coherent biclusters of microarray data by imitating the ecosystem : an ant colony algorithmic approach / D. Mishra, A.K. …”
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence. by Kvasnicka, V.

    Published 2002
    Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Bio-inspired computation in telecommunications

    Published 2015
    Table of Contents: “…Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  8. 168
  9. 169

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Simplified quantum computing with applications by Nagata, Koji, Do, Ngoc Diep, Farouk, Ahmed (Ph. D. in computer science), Nakamura, Tadao (Ph. D. in electronics)

    Published 2022
    Table of Contents: “…14. Quantum algorithms for finding the roots of a polynomial function -- 14.1. …”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Cybernetic intelligent systems

    Published 2014
    Table of Contents: “…Cover ; Editorial advisory board ; Editorial ; Guest editorial ; HDR imaging for feature tracking in challenging visibility scenes ; A new classification strategy for human activity recognition using cost sensitive support vector machines for imbalanced data ; Coarticulation and speech synchronization in MPEG-4 based facial animation ; Semantic Category theory and Semantic Intertwine: the anathema of mathematics ; Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172
  13. 173

    Text mining : applications and theory

    Published 2010
    Table of Contents: “…Automatic Keyword Extraction from Individual Documents / Stuart Rose, Dave Engel, Nick Cramer, Wendy Cowley -- Algebraic Techniques for Multilingual Document Clustering / Brett W Bader, Peter A Chew -- Content-Based Spam Email Classification using Machine-Learning Algorithms / Eric P Jiang -- Utilizing Nonnegative Matrix Factorization for Email Classification Problems / Andreas G K Janecek, Wilfried N Gansterer -- Constrained Clustering with -means Type Algorithms / Ziqiu Su, Jacob Kogan, Charles Nicholas -- Anomaly and Trend Detection. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 174

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…An Entropy Measure for Continuous and Nominal Data Types -- 4. Algorithm to Find Important Variables -- 5. Experimental Studies -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Can markets compute equilibria? by Monroe, Hunter K.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  16. 176
  17. 177

    Advances in scalable web information integration and service : proceedings of DASFAA2007, Bangkok, Thailand, 9-12 April 2007

    Published 2007
    Table of Contents: “…Invited session. Using semantics in XML data management / Tok Wang Ling and Gillian Dobbie. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 178

    Information modelling and knowledge bases XXX

    Published 2019
    Table of Contents: “…Intro; Title Page; Preface; Committees; Contents; Goal-Oriented Adaptive and Extensible Study-Process Creation with Optimal Cyclic-Learning in Graph-Structured Knowledge; A Process Calculus for Design and Modeling of Retro-Synthesis; The Discrete-Event Approach to Simulate Stochastic Multi-Product (r, Q) Inventory Control Systems; A Semantic Orthogonal Mapping Method Through Deep-Learning for Semantic Computing; Cultures in Information Systems Development; Clutter Reduction in Parallel Coordinates Using Aesthetic Criteria; Toward Manageable Data Sources…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 179

    Metaheuristics for intelligent electrical networks by Héliodore, Frédéric, Nakib, Amir, Ismail, Boussaad, Ouchraa, Salma, Schmitt, Laurent

    Published 2017
    Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Theory and applications of image registration by Goshtasby, Ardeshir

    Published 2017
    Full text (MFA users only)
    Electronic eBook