Search Results - (((((((ant OR wiant) OR semantic) OR win) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 181

    Pervasive Computing in Cognitive Communications Applications. by Ghinea, George

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
    Full text (MFA users only)
    eBook
  2. 182

    Analysis of biological data : a soft computing approach

    Published 2007
    Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Smart intelligent computing and communication technology

    Published 2021
    Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 184
  5. 185

    Advanced Methods and Technologies for Agent and Multi-Agent Systems. by Edited by

    Published 2013
    Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Numerical methods for viscosity solutions and applications

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  8. 188

    DSP with Python Programming. by Charbit, Maurice

    Published 2017
    Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  10. 190

    OpenCV Android Programming By Example. by Muhammad, Amgad

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Signal Design for Modern Radar Systems. by Alaee-Kerahroodi, Mohammad

    Published 2022
    Table of Contents: “…Intro -- Introduction -- Practical Signal Design -- The Why -- The How -- The What -- Radar Application Focus Areas -- Designing Signals with Good Correlation Properties -- Signal Design to Enhance SINR -- Spectral Shaping and Coexistence with Communications -- Automotive Radar Signal Processing and Sensing for Autonomous Vehicles -- What this Book Offers -- References -- Convex and Nonconvex Optimization -- Optimization Algorithms -- Gradient Descent Algorithm -- Newton's Method -- Mirror Descent Algorithm -- Power Method-Like Iterations -- Majorization-Minimization Framework…”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Design studies and intelligence engineering

    Published 2022
    Table of Contents: “…Intro -- Title Page -- Preface -- Contents -- PSIC3839: Predicting the Overall Emotion and Depth of Entire Songs -- Research on Noise Control of Product Symbol Communication Channel-Take a Small Rice Mill for Example -- Towards Better Data Pre-Processing for Building Recipe Recommendation Systems from Industrial Fabric Dyeing Manufacturing Records: Categorization of Coloration Properties for a Dye Combination on Different Fabrics -- A Multi-Robot Planning Algorithm with Quad Tree Map Division for Obstacles of Irregular Shape…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 193

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  15. 195

    Metaheuristics for vehicle routing problems. by Labadie, Nacima

    Published 2015
    Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
    Full text (MFA users only)
    Electronic eBook
  16. 196

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Spatial Statistics and Digital Image Analysis.

    Published 1900
    Table of Contents: “…""Posterior Distribution""""Model Identification""; ""Attribute Estimation""; ""Algorithms""; ""2.4.2 Examples""; ""Image Restoration""; ""Boundary Detection""; ""Single Photon Emission Tomography""; ""Shape-From-Shading""; ""Deformable Templates""; ""Bibliography""; ""3 Oceanographic and Atmospheric Applications of Spatial Statistics and Digital Image Analysis""; ""3.1 INTRODUCTION""; ""3.2 SELECTED ANALYSIS AREAS""; ""3.2.1 Principal Component Analysis""; ""General Concepts""; ""Multispectral Data Application""; ""Multi-Temporal Data Application""…”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Mathematical Research in Materials Science : Opportunities and Perspectives. by Staff, National Research Council

    Published 1900
    Table of Contents: “…""STIFF POLYMERS AND LIQUID CRYSTALS""""OTHER PROBLEMS""; ""4 EVOLUTION OF MICROSTRUCTURES""; ""INTRODUCTION""; ""SPINODAL DECOMPOSITION AND NUCLEATION""; ""GRAIN GROWTH AND OTHER INTERFACE MOTION CONTROLLED BY INTERFACE KINETICS""; ""Computer Algorithms""; ""SHAPE EVOLUTION CONTROLLED BY SURFACE DIFFUSION""; ""MORPHOLOGICAL STABILITY""; ""Phase Transformations and Pattern Formation""; ""Dendritic Growth""; ""MUSHY ZONES""; ""PRECIPITATION AND COARSENING""; ""Evolution of Microstructures; Stress and Current Effects""; ""MARTENSITE AND SHAPE-MEMORY MATERIALS""; ""MAGNETIC MATERIALS""…”
    Full text (MFA users only)
    Electronic eBook
  20. 200

    Parallel computing : technology trends

    Published 2020
    Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook