Search Results - (((((((ant OR wants) OR semantic) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 46
- Artificial intelligence 41
- Mathematics 38
- Mathematical models 30
- Machine learning 29
- Data mining 23
- Mathematical optimization 20
- artificial intelligence 20
- Algorithms 19
- Technological innovations 17
- algorithms 17
- Artificial Intelligence 14
- Computer science 14
- Python (Computer program language) 13
- Computer networks 12
- Data Mining 12
- Information technology 12
- Automatic control 11
- Neural networks (Computer science) 11
- Design and construction 10
- Materials 10
- methods 10
- Big data 9
- Computer algorithms 9
- Engineering 9
- Image processing 9
- Machine Learning 9
- Manufacturing processes 9
- Application software 8
- Development 8
Search alternatives:
- ant »
- wants »
- semantic »
- cantor »
- wind »
- plane »
-
321
Cognitive Electronic Warfare : An Artificial Intelligence Approach.
Published 2021Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
Full text (MFA users only)
Electronic eBook -
322
Calculating the Secrets of Life : Contributions of the Mathematical Sciences to Molecular Biology.
Published 1994Full text (MFA users only)
Electronic eBook -
323
Three Views of Logic : Mathematics, Philosophy, and Computer Science.
Published 2014Table of Contents: “…Proof Theory; 1 Propositional Logic; 1.1 Propositional Logic Semantics; 1.2 Syntax: Deductive Logics; 1.3 The Resolution Formal Logic; 1.4 Handling Arbitrary Propositional Wffs; 2 Predicate Logic; 2.1 First-Order Semantics; 2.2 Resolution for the Predicate Calculus; 2.2.1 Substitution; 2.2.2 The Formal System for Predicate Logic; 2.2.3 Handling Arbitrary Predicate Wffs; 3 An Application: Linear Resolution and Prolog; 3.1 OSL-Resolution; 3.2 Horn Logic; 3.3 Input Resolution and Prolog; Appendix A: The Induction Principle.…”
Full text (MFA users only)
Electronic eBook -
324
Seismic Data Interpretation using Digital Image Processing
Published 2017Table of Contents: “…5.5 Two-Dimensional Second-Order Derivative Operator5.5.1 The Coherence Attribute; 5.5.2 The Dip Attribute; 5.6 The Curvature Attribute; 5.7 Curvature of the Surface; 5.7.1 Curve, Velocity, and Curvature; 5.7.2 Surface, Tangent Plane, and Norm; 5.8 Shape Operator, Normal Curvature, and Principal Curvature; 5.8.1 Normal Curvature; 5.8.2 Shape Operator; 5.8.3 The Principal Curvatures; 5.8.4 Calculation of the Principal Curvatures; 5.8.5 Summary of Calculation of Principal Curvature for a Surface; 5.9 The Randomness Attribute; 5.10 Technique for Two-Dimensional Images.…”
Full text (MFA users only)
Electronic eBook -
325
Advances in product development and reliability III : selected, peer reviewed papers from the 3rd International Conference on Advances in Product Development and Reliability (PDR 2...
Published 2012Table of Contents: “…Advances in Product Development and Reliability III; Preface and Organizing Committee; Table of Contents; Solving the Flexible Job Shop Scheduling Problem Based on Memetic Algorithm; The Optimal Combination Research of System Configuration and T&M Policy of Standby Safety System; Black Box System Multi-Objective Optimization Based on Design of Experiment; Strength and Reliability Analysis of Hydraulic Support; Equipment Performance Degradation Modeling for Reliability Prediction Based on n-ARIMA Model; Research on Fault Diagnosis Based on BP-SOM Hybrid Algorithms for NC Machine…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
326
Chemical, mechanical and materials engineering : selected, peer reviewed papers from the 2011 International Conference on Chemical, Mechanical and Materials Engineering (CMME2011),...
Published 2011Table of Contents: “…Preparation and Exothermic Characterization of Dioctyl Sebacate (DOS)-Coated Aluminum NanopowdersApplication of Genetic Algorithm in Chemical Reaction Kinetics; Molten Slag Structure and Diffusion Coefficients of Cr3+ and Si4+ during Micro-Carbon Cr-Fe Alloy Production; Dynamic Crushing of Hexagonal Honeycombs under In-Plane Loading; Application of LOD Technology in the 3DVR Remote Control Platform for Shearer; Bearing Fault Diagnosis Based on Probability Boxes Theory and SVM Method; Study on Industry Process of the Rubber Anti-Oxidant RD…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
327
Big data in medical science and healthcare management : diagnosis, therapy, side effects
Published 2016Table of Contents: “…Autopilot and "doctor algorithm"? -- 1. Intro big data for healthcare? / Peter Langkafel -- 2. …”
Full text (MFA users only)
Electronic eBook -
328
Real-time database systems : architecture and techniques
Published 2001Full text (MFA users only)
Electronic eBook -
329
Anechoic and Reverberation Chambers : Theory, Design and Measurements.
Published 2018Table of Contents: “…2.4.2 Analytical Expression of a Reflected Field from a Curved Surface2.4.3 Alternative GO Form; 2.5 GO-FEM Hybrid Method; 2.6 Summary; References; Chapter 3 Computer-aided Anechoic Chamber Design; 3.1 Introduction; 3.2 Framework; 3.3 Software Implementation; 3.3.1 3D Model Description; 3.3.2 Algorithm Complexities; 3.3.3 Far-Field Data; 3.3.4 Boundary Conditions; 3.3.5 RAM Description; 3.3.6 Forward Algorithm; 3.3.7 Inverse Algorithm; 3.3.8 Post Processing; 3.4 Summary; References; Chapter 4 Anechoic Chamber Design Examples and Verifications; 4.1 Introduction; 4.2 Normalised Site Attenuation.…”
Full text (MFA users only)
Electronic eBook -
330
Mathematics and Multi-Ethnic Students : Exemplary Practices.
Published 2013Table of Contents: “…LYNNE GODFREY: AFRICAN AMERICANS AND THE ALGEBRA PROJECT; Engaging Students; Warm-Up; Group Work; The Winding Game; Discussion between Colleagues; Commentary; Unit Overview: The Chinese Zodiac and the Division Algorithm; 5. …”
Full text (MFA users only)
Electronic eBook -
331
Gradience in grammar : generative perspectives
Published 2006Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
Full text (MFA users only)
Electronic eBook -
332
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
333
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
Full text (MFA users only)
Electronic eBook -
334
HTML5 Multimedia Development Cookbook.
Published 2011Table of Contents: “…More flexible footer contentApplying the outline algorithm; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Are you sure?…”
Full text (MFA users only)
Electronic eBook -
335
Circuit analysis
Published 2011Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
336
From text to political positions : text analysis across disciplines
Published 2014Table of Contents: “…Conditional probabilities and associative framing ; Semantic network analysis.…”
Full text (MFA users only)
Electronic eBook -
337
Challenges in information technology management
Published 2008Table of Contents: “…Improved data mining algorithms for frequent patterns with composite items / Ke Wang, James N.K. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
338
Meeting security challenges through data analytics and decision support
Published 2016Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
339
On the Shoulders of Giants : New Approaches to Numeracy.
Published 1990Table of Contents: “…""Planes and Surfaces""""Three-Dimensional Space""; ""Higher-Dimensional Spaces""; ""CONFIGURATION SPACES""; ""The Fourth Dimension""; ""Statics and Dynamics""; ""SLICING IN DIFFERENT DIMENSIONS""; ""Visitors from Higher Dimensions""; ""COUNTING COMBINATIONS""; ""Counting Triangles""; ""Counting Squares and Cubes""; ""Seeking Patterns""; ""REFERENCES AND RECOMMENDED READING""; ""Quantity""; ""QUANTITY IN SCHOOL MATHEMATICS""; ""Influence of Technology""; ""Influence of Applications""; ""Influence of Psychological Research""; ""FUNDAMENTAL CONCEPTS""; ""Numbers and Operations""…”
Full text (MFA users only)
Electronic eBook -
340
Fuzzy systems and data mining II : proceedings of FSDM 2016
Published 2016Table of Contents: “…Adaptive Fuzzy Sliding-Mode Control of Robot and SimulationHesitant Bipolar Fuzzy Set and Its Application in Decision Making; Chance Constrained Twin Support Vector Machine for Uncertain Pattern Classification; Set-Theoretic Kripke-Style Semantics for Monoidal T-Norm (Based) Logics; Data Mining; Dynamic Itemset Mining Under Multiple Support Thresholds; Deep Learning with Large Scale Dataset for Credit Card Data Analysis; Probabilistic Frequent Itemset Mining Algorithm over Uncertain Databases with Sampling; Priority Guaranteed and Energy Efficient Routing in Data Center Networks.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook