Search Results - (((((((ant OR wants) OR semantic) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.

  1. 321

    Cognitive Electronic Warfare : An Artificial Intelligence Approach. by Haigh, Karen

    Published 2021
    Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
    Full text (MFA users only)
    Electronic eBook
  2. 322
  3. 323

    Three Views of Logic : Mathematics, Philosophy, and Computer Science. by Loveland, Donald W.

    Published 2014
    Table of Contents: “…Proof Theory; 1 Propositional Logic; 1.1 Propositional Logic Semantics; 1.2 Syntax: Deductive Logics; 1.3 The Resolution Formal Logic; 1.4 Handling Arbitrary Propositional Wffs; 2 Predicate Logic; 2.1 First-Order Semantics; 2.2 Resolution for the Predicate Calculus; 2.2.1 Substitution; 2.2.2 The Formal System for Predicate Logic; 2.2.3 Handling Arbitrary Predicate Wffs; 3 An Application: Linear Resolution and Prolog; 3.1 OSL-Resolution; 3.2 Horn Logic; 3.3 Input Resolution and Prolog; Appendix A: The Induction Principle.…”
    Full text (MFA users only)
    Electronic eBook
  4. 324

    Seismic Data Interpretation using Digital Image Processing by Al-Shuhail, Abdullatif A., Al-Dossary, Saleh A., Mousa, Wail A.

    Published 2017
    Table of Contents: “…5.5 Two-Dimensional Second-Order Derivative Operator5.5.1 The Coherence Attribute; 5.5.2 The Dip Attribute; 5.6 The Curvature Attribute; 5.7 Curvature of the Surface; 5.7.1 Curve, Velocity, and Curvature; 5.7.2 Surface, Tangent Plane, and Norm; 5.8 Shape Operator, Normal Curvature, and Principal Curvature; 5.8.1 Normal Curvature; 5.8.2 Shape Operator; 5.8.3 The Principal Curvatures; 5.8.4 Calculation of the Principal Curvatures; 5.8.5 Summary of Calculation of Principal Curvature for a Surface; 5.9 The Randomness Attribute; 5.10 Technique for Two-Dimensional Images.…”
    Full text (MFA users only)
    Electronic eBook
  5. 325

    Advances in product development and reliability III : selected, peer reviewed papers from the 3rd International Conference on Advances in Product Development and Reliability (PDR 2...

    Published 2012
    Table of Contents: “…Advances in Product Development and Reliability III; Preface and Organizing Committee; Table of Contents; Solving the Flexible Job Shop Scheduling Problem Based on Memetic Algorithm; The Optimal Combination Research of System Configuration and T&M Policy of Standby Safety System; Black Box System Multi-Objective Optimization Based on Design of Experiment; Strength and Reliability Analysis of Hydraulic Support; Equipment Performance Degradation Modeling for Reliability Prediction Based on n-ARIMA Model; Research on Fault Diagnosis Based on BP-SOM Hybrid Algorithms for NC Machine…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 326

    Chemical, mechanical and materials engineering : selected, peer reviewed papers from the 2011 International Conference on Chemical, Mechanical and Materials Engineering (CMME2011),...

    Published 2011
    Table of Contents: “…Preparation and Exothermic Characterization of Dioctyl Sebacate (DOS)-Coated Aluminum NanopowdersApplication of Genetic Algorithm in Chemical Reaction Kinetics; Molten Slag Structure and Diffusion Coefficients of Cr3+ and Si4+ during Micro-Carbon Cr-Fe Alloy Production; Dynamic Crushing of Hexagonal Honeycombs under In-Plane Loading; Application of LOD Technology in the 3DVR Remote Control Platform for Shearer; Bearing Fault Diagnosis Based on Probability Boxes Theory and SVM Method; Study on Industry Process of the Rubber Anti-Oxidant RD…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 327

    Big data in medical science and healthcare management : diagnosis, therapy, side effects

    Published 2016
    Table of Contents: “…Autopilot and "doctor algorithm"? -- 1. Intro big data for healthcare? / Peter Langkafel -- 2. …”
    Full text (MFA users only)
    Electronic eBook
  8. 328

    Real-time database systems : architecture and techniques

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  9. 329

    Anechoic and Reverberation Chambers : Theory, Design and Measurements. by Xu, Qian

    Published 2018
    Table of Contents: “…2.4.2 Analytical Expression of a Reflected Field from a Curved Surface2.4.3 Alternative GO Form; 2.5 GO-FEM Hybrid Method; 2.6 Summary; References; Chapter 3 Computer-aided Anechoic Chamber Design; 3.1 Introduction; 3.2 Framework; 3.3 Software Implementation; 3.3.1 3D Model Description; 3.3.2 Algorithm Complexities; 3.3.3 Far-Field Data; 3.3.4 Boundary Conditions; 3.3.5 RAM Description; 3.3.6 Forward Algorithm; 3.3.7 Inverse Algorithm; 3.3.8 Post Processing; 3.4 Summary; References; Chapter 4 Anechoic Chamber Design Examples and Verifications; 4.1 Introduction; 4.2 Normalised Site Attenuation.…”
    Full text (MFA users only)
    Electronic eBook
  10. 330

    Mathematics and Multi-Ethnic Students : Exemplary Practices. by Germain- Mc Carthy, Yvelyne

    Published 2013
    Table of Contents: “…LYNNE GODFREY: AFRICAN AMERICANS AND THE ALGEBRA PROJECT; Engaging Students; Warm-Up; Group Work; The Winding Game; Discussion between Colleagues; Commentary; Unit Overview: The Chinese Zodiac and the Division Algorithm; 5. …”
    Full text (MFA users only)
    Electronic eBook
  11. 331

    Gradience in grammar : generative perspectives

    Published 2006
    Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
    Full text (MFA users only)
    Electronic eBook
  12. 332

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  13. 333

    Constraint Solving over Multi-valued Logics : Application to Digital Circuits.

    Published 2002
    Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  14. 334

    HTML5 Multimedia Development Cookbook. by Cruse, Dale

    Published 2011
    Table of Contents: “…More flexible footer contentApplying the outline algorithm; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Are you sure?…”
    Full text (MFA users only)
    Electronic eBook
  15. 335

    Circuit analysis

    Published 2011
    Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  16. 336

    From text to political positions : text analysis across disciplines

    Published 2014
    Table of Contents: “…Conditional probabilities and associative framing ; Semantic network analysis.…”
    Full text (MFA users only)
    Electronic eBook
  17. 337

    Challenges in information technology management

    Published 2008
    Table of Contents: “…Improved data mining algorithms for frequent patterns with composite items / Ke Wang, James N.K. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 338

    Meeting security challenges through data analytics and decision support

    Published 2016
    Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 339

    On the Shoulders of Giants : New Approaches to Numeracy.

    Published 1990
    Table of Contents: “…""Planes and Surfaces""""Three-Dimensional Space""; ""Higher-Dimensional Spaces""; ""CONFIGURATION SPACES""; ""The Fourth Dimension""; ""Statics and Dynamics""; ""SLICING IN DIFFERENT DIMENSIONS""; ""Visitors from Higher Dimensions""; ""COUNTING COMBINATIONS""; ""Counting Triangles""; ""Counting Squares and Cubes""; ""Seeking Patterns""; ""REFERENCES AND RECOMMENDED READING""; ""Quantity""; ""QUANTITY IN SCHOOL MATHEMATICS""; ""Influence of Technology""; ""Influence of Applications""; ""Influence of Psychological Research""; ""FUNDAMENTAL CONCEPTS""; ""Numbers and Operations""…”
    Full text (MFA users only)
    Electronic eBook
  20. 340

    Fuzzy systems and data mining II : proceedings of FSDM 2016

    Published 2016
    Table of Contents: “…Adaptive Fuzzy Sliding-Mode Control of Robot and SimulationHesitant Bipolar Fuzzy Set and Its Application in Decision Making; Chance Constrained Twin Support Vector Machine for Uncertain Pattern Classification; Set-Theoretic Kripke-Style Semantics for Monoidal T-Norm (Based) Logics; Data Mining; Dynamic Itemset Mining Under Multiple Support Thresholds; Deep Learning with Large Scale Dataset for Credit Card Data Analysis; Probabilistic Frequent Itemset Mining Algorithm over Uncertain Databases with Sampling; Priority Guaranteed and Energy Efficient Routing in Data Center Networks.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook