Search Results - (((((((ant OR wiant) OR wiant) OR wwkantiee) OR cantor) OR anne) OR carter) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 18
- Mathematical optimization 16
- artificial intelligence 12
- Data processing 11
- Algorithms 10
- Mathematics 10
- algorithms 9
- Machine learning 8
- Mathematical models 8
- Neural networks (Computer science) 8
- Artificial Intelligence 7
- Data mining 5
- Design and construction 5
- Information technology 5
- Swarm intelligence 5
- Technological innovations 5
- Computer algorithms 4
- Neural Networks, Computer 4
- Social aspects 4
- Bioinformatics 3
- Computational Biology 3
- Computational biology 3
- Computer networks 3
- Computer programming 3
- Digital techniques 3
- Electric power systems 3
- Graph theory 3
- History 3
- Intelligent agents (Computer software) 3
- Machine Learning 3
Search alternatives:
- ant »
- wiant »
- wwkantiee »
- cantor »
-
141
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
142
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
143
-
144
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
145
-
146
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
147
Understanding smart sensors
Published 2013Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
Full text (MFA users only)
Electronic eBook -
148
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
149
Visual Inspection Technology in the Hard Disc Drive Industry.
Published 2015Table of Contents: “…Introduction / Suchart Yammen / Paisarn Muneesawang -- 1.2. Algorithm for corrosion detection / Suchart Yammen / Paisarn Muneesawang -- 1.2.1. …”
Full text (MFA users only)
Electronic eBook -
150
Fundamentals of Fluid Power Control.
Published 2009Table of Contents: “…Control-Volume Flow Continuity -- PRV Flow -- Force Balance at the Spindle -- 5.13.3 Frequency Response from a Linearized Transfer Function Analysis -- 5.14 Servovalve Dynamics -- First-Stage, Armature, and Flapper-Nozzle -- Flapper-Nozzle and Resistance Bridge Flow Characteristic -- Force Balance at the Spool -- 5.15 An Open-Loop Servovalve-Motor Drive with Line Dynamics Modeled by Lumped Approximations -- Servovalve, Dynamics Included, Underlapped Spool -- Lines, Laminar Mean Flow, Two Lump Approximations per Line, Negligible Motor Internal Volume -- Motor Flow and Torque Equations -- 5.16 Transmission Line Dynamics -- 5.16.1 Introduction -- Servovalve-Cylinder with Short Lines and Significant Actuator Volumes -- Servovalve-Motor with Long Lines and Negligible Actuator Volumes -- 5.16.2 Lossless Line Model for Z and Y -- 5.16.3 Average and Distributed Line Friction Models for Z and Y -- 5.16.4 Frequency-Domain Analysis -- 5.16.5 Servovalve-Reflected Linearized Coefficients -- 5.16.6 Modeling Systems with Nonlossless Transmission Lines, the Modal Analysis Method -- 5.16.7 Modal Analysis Applied to a Servovalve-Motor Open-Loop Drive -- 5.17 The State-Space Method for Linear Systems Modeling -- 5.17.1 Modeling Principles -- 5.17.2 Some Further Aspects of the Time-Domain Solution -- 5.17.3 The Transfer Function Concept in State Space -- 5.18 Data-Based Dynamic Modeling -- 5.18.1 Introduction -- 5.18.2 Time-Series Modeling -- 5.18.3 The Group Method of Data Handling (GMDH) Algorithm -- 5.18.4 Artificial Neural Networks -- 5.18.5 A Comparison of Time-Series, GMDH, and ANN Modeling of a Second-Order Dynamic System -- 5.18.6 Time-Series Modeling of a Position Control System -- 5.18.7 Time-Series Modeling for Fault Diagnosis -- 5.18.8 Time-Series Modeling of a Proportional PRV -- 5.18.9 GMDH Modeling of a Nitrogen-Filled Accumulator.…”
Full text (MFA users only)
Electronic eBook -
151