Search Results - (((((((ant OR wants) OR semantic) OR king) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 47
- Artificial intelligence 42
- Mathematics 34
- Machine learning 29
- Mathematical models 26
- Data mining 22
- artificial intelligence 21
- Algorithms 19
- Mathematical optimization 19
- algorithms 16
- Artificial Intelligence 14
- Computer science 14
- Python (Computer program language) 14
- Computer networks 12
- Information technology 12
- Technological innovations 12
- Data Mining 11
- Neural networks (Computer science) 11
- methods 10
- Automatic control 9
- Big data 9
- Image processing 9
- Machine Learning 9
- Application software 8
- Computer algorithms 8
- Development 8
- Digital techniques 8
- Graph theory 8
- Materials 8
- Computational linguistics 7
Search alternatives:
- ant »
- wants »
- semantic »
- cantor »
- plane »
-
321
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
322
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
323
Fast sequential Monte Carlo methods for counting and optimization
Published 2013Full text (MFA users only)
Electronic eBook -
324
Artificial Intelligence Research and Development.
Published 2012Table of Contents: “…Using Gabriel Graphs in Borderline-SMOTE to Deal with Severe Two-Class Imbalance Problems on Neural NetworksActive Learning of Actions Based on Support Vector Machines; Towards the Formalization of Re-Identification for Some Data Masking Methods; Natural Language Processing and Recommenders; Towards Object Descriptions in Natural Language from Qualitative Models; Semantically-Enhanced Recommenders; Computer Vision; Supervised Texture Classification Using Optimization Techniques; Modelling Facial Expressions Dynamics with Gaussian Process Regression; Survey on 2D and 3D Human Pose Recovery…”
Full text (MFA users only)
Electronic eBook -
325
Airline industry : strategies, operations and safety
Published 2011Table of Contents: “…4.6. Problem Solving Algorithms 5. EXPERIMENTAL SETUP ; 6. RESULTS AND DISCUSSION ; 7. …”
Full text (MFA users only)
Electronic eBook -
326
Biomedical image understanding : methods and applications
Published 2014Full text (MFA users only)
Electronic eBook -
327
Large-Scale Structures in Acoustics and Electromagnetics : Proceedings of a Symposium.
Published 1900Table of Contents: “…""A Family of Highly Absorbing Boundary Conditions""""Remarks:""; ""Operators And For Taylor-Galerkin Schemes""; ""ADAPTIVITY""; ""A FREQUENCY-DOMAIN APPROACH""; ""The Galerkin-Burton-Miller Formulation""; ""NUMERICAL EXAMPLES""; ""Example 1: Diffraction of a Plane Wave from an Elastic Cylindrical Shell (2D)""; ""Acoustic Fluid""; ""Elastic Cylinder""; ""Example 2: The Vibrating Cylinder Problem""; ""Example 3: The Coupled FE/BE Methods versus the Time-Domain Method""; ""ACKNOWLEDGMENT""; ""REFERENCES""; ""2 Distributed Feedback Resonators""; ""INTRODUCTION""…”
Full text (MFA users only)
Electronic eBook -
328
Numerical linear algebra with applications : using MATLAB
Published 2015Full text (MFA users only)
Electronic eBook -
329
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
330
Practical geolocation for electronic warfare using MATLAB
Published 2022Full text (MFA users only)
Electronic eBook -
331
Towards Cognitive Autonomous Networks : Network Management Automation for 5G and Beyond.
Published 2020Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- List of Contributors -- Foreword I -- Foreword II -- Preface -- Chapter 1 The Need for Cognitive Autonomy in Communication Networks -- 1.1 Complexity in Communication Networks -- 1.1.1 The Network as a Graph -- 1.1.2 Planes, Layers, and Cross-Functional Design -- 1.1.3 New Network Technology -- 5G -- 1.1.4 Processes, Algorithms, and Automation -- 1.1.5 Network State Changes and Transitions -- 1.1.6 Multi-RAT Deployments -- 1.2 Cognition in Network Management Automation -- 1.2.1 Business, Service and Network Management Systems…”
Full text (MFA users only)
eBook -
332
Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...
Published 2012Table of Contents: “…A Study on Corrosion Resistance and Weatherability of Fluorocarbon Anti-Corrosion Coatings for External Surface of Ocean PlatformA Study on the Mechanical Properties of Polymer-Ceramic Composite Using Injection Moulding; An Enhanced Resolution Three-Dimensional Transformation Method Based on Discrete Wavelet Transform; An Entropy Based Analytical Model for Thermoelastic Damping in Micromechanical Resonators; An Improved Ant Colony Optimization for Large-Scale Simple Assembly Line Balancing Problem of Type-1…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
333
Mechatronic Systems, Mechanics and Materials II : Selected, peer reviewed papers from the Symposium on Mechatronics Systems, Mechanics and Materials 2013, October 9-10, 2013, Jastr...
Published 2013Table of Contents: “…Optimization-Supported Decision-Making in the Marine Game Environment Prediction of the Spatial Orientation of a Ship by Means of Neural Networks; Safe Ship Control Method with the Use of Ant Colony Optimization; Selected Problems of the Asynchronous Drive Control with the Three-Phase Soft-Start System; System Architecture of Mission Planning and Autonomous Surface Vessel Control; The Characteristics of the Matrix Game Sensitivity of the Safe Passing of Ships at Sea; The Comparison of Parameter Identification Methods for Fractional, Partial Differential Equation; III. …”
Full text (MFA users only)
Electronic eBook -
334
The linguistic cerebellum
Published 2015Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
Full text (MFA users only)
Electronic eBook -
335
Hierarchical Protection for Smart Grids.
Published 2018Table of Contents: “…2.3.4 Adaptive Overload Identification Method Based on the Complex Phasor Plane2.3.5 Novel Fault Phase Selection Scheme Utilizing Fault Phase Selection Factors; 2.4 Summary; References; Chapter 3 Local Area Protection for Renewable Energy; 3.1 Introduction; 3.2 Fault Transient Characteristics of Renewable Energy Sources; 3.2.1 Mathematical Model and LVRT Characteristics of the DFIG; 3.2.2 DFIG Fault Transient Characteristics When Crowbar Protection Is Not Put into Operation; 3.2.3 DFIG Fault Transient Characteristics When Crowbar Protection Is Put into Operation.…”
Full text (MFA users only)
Electronic eBook -
336
Informatics for Health
Published 2017Table of Contents: “…An Automatic Approach for Analyzing Treatment Effectiveness Based on Medication Hierarchy -- The Myocardial Infarction Case Study -- Evaluation of Machine Learning Methods to Predict Coronary Artery Disease Using Metabolomic Data -- Dermatology Disease Prediction Based on Two Step Cascade Genetic Algorithm Optimization of ANFIS Parameters -- Querying EHRs with a Semantic and Entity-Oriented Query Language -- Evaluation of the Terminology Coverage in the French Corpus LiSSa -- Linked Data Applications Through Ontology Based Data Access in Clinical Research -- Epidemiological Models Lacking Process Noise Can Be Overconfident -- Disentangling Prognostic and Predictive Biomarkers Through Mutual Information -- IntegrIT -- Towards Utilizing the Swedish National Health Information Exchange Platform for Clinical Research -- Introducing a Method for Transformation of Paper-Based Research Data into Concept-Based Representation with openEHR -- The P̀EARL' Data Warehouse: Initial Challenges Faced with Semantic and Syntactic Interoperability -- Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data -- Application of Correspondence Analysis to Graphically Investigate Associations Between Foods and Eating Locations -- Data Driven Quality Improvement of Health Professions Education: Design and Development of CLUE -- An Interactive Curriculum Data Visualization Tool -- Developing Healthcare Data Analytics APPs with Open Data Science Tools -- Fast and Efficient Feature Engineering for Multi-Cohort Analysis of EHR Data -- Development and Evaluation of a Case-Based Retrieval Service -- Learning Differentially Expressed Gene Pairs in Microarray Data -- Developing a Manually Annotated Corpus of Clinical Letters for Breast Cancer Patients on Routine Follow-Up -- Automated Diagnosis Coding with Combined Text Representations.…”
Full text (MFA users only)
Electronic eBook -
337
-
338
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
339
150 Years of Quantum Many-Body Theory : a Festschrift In Honour of The 65Th Birthdays of John W Clark, Alpo J Kallio, Manfred L Ristig and Sergio Rosati.
Published 2001Table of Contents: “…Kallio; Manfred Ristig; Sergio Rosati; A Historical Perspective; The Music of the QMBT Quartet; Formal Aspects of Many-Body Theory; Diagrams are Theoretical Physicist's Best Friends; Fourth Order Algorithms for Solving Diverse Many-Body Problems; Relativistic Quantum Dynamics of Many-Body Systems; Elastic N-body to N-body Scattering in the Hyperspherical Representation; A Generic Way to Look at Many-Body Theory; A Variational Coupled-Cluster Theory…”
Full text (MFA users only)
Electronic eBook -
340
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook