Search Results - (((((((ant OR wikant) OR anti) OR warten) OR cantor) OR anne) OR carter) OR cantini) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 20
- Mathematical optimization 15
- Mathematics 12
- artificial intelligence 12
- Data processing 11
- Mathematical models 11
- Diseases 9
- Neural networks (Computer science) 8
- Technological innovations 8
- Artificial Intelligence 7
- Machine learning 7
- Information technology 6
- Social aspects 6
- Algorithms 5
- Data mining 5
- Design and construction 5
- Materials 5
- Research 5
- Swarm intelligence 5
- algorithms 5
- diagnosis 5
- methods 5
- Automatic control 4
- Bioinformatics 4
- Chemical engineering 4
- Computational biology 4
- Computer simulation 4
- Electric power systems 4
- Manufacturing processes 4
- Mechanical engineering 4
Search alternatives:
- ant »
- wikant »
- anti »
- cantor »
- cantini »
- warten »
-
61
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
62
Computational Systems Bioinformatics (Volume 6) : Proceedings of the CSB 2007 Conference.
Published 2007Table of Contents: “…INTRODUCTION; Preprocessing to remove noisy peaks; The anti-symmetric problem; 2. ANALYSIS OF PROBLEMS AND CURRENT ALGORITHMS; 2.1. …”
Full text (MFA users only)
Electronic eBook -
63
Metaheuristics for intelligent electrical networks
Published 2017Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
Full text (MFA users only)
Electronic eBook -
64
OIPE 2012
Published 2014Table of Contents: “…N-level output space mapping for electromagnetic design optimizationHigh-speed functionality optimization of five-phase PM machine using third harmonic current; Topology optimization of magnetostatic shielding using multistep evolutionary algorithms with additional searches in a restricted design space ; Adaptive unscented transform for uncertainty quantification in EMC large-scale systems; Ant colony optimization for the topological design of interior permanent magnet (IPM)machines; Multiobjective approach developed for optimizing the dynamic behavior of incremental linear actuators.…”
Full text (MFA users only)
Electronic eBook -
65
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
66
Data Analytics Applied to the Mining Industry.
Published 2020Table of Contents: “…Advanced Data Analytics -- Introduction -- Big Data -- Analytics -- Deep Learning -- CNNs -- Deep Neural Network -- Recurrent Neural Network (RNN) -- ML -- Fuzzy Logic -- Classification Techniques -- Clustering -- Evolutionary Techniques -- Genetic Algorithms (GAs) -- Ant Colony Optimization (ACO)…”
Full text (MFA users only)
Electronic eBook -
67
-
68
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
69
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
70
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
71
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
72
Modern optimization methods for science, engineering and technology
Published 2020Table of Contents: “…Implementing the traveling salesman problem using a modified ant colony optimization algorithm -- 5.1. ACO and candidate list -- 5.2. …”
Full text (MFA users only)
Electronic eBook -
73
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
74
Advances in nonlinear waves and symbolic computation
Published 2009Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
Full text (MFA users only)
Electronic eBook -
75
Twitter and tear gas : the power and fragility of networked protest
Published 2017Full text (MFA users only)
Electronic eBook -
76
Communication System Security.
Published 2012Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
Full text (MFA users only)
Electronic eBook -
77
Analysis of biological data : a soft computing approach
Published 2007Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
Full text (MFA users only)
Electronic eBook -
78
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
79
Continuing Kepler's Quest : Assessing Air Force Space Command's Astrodynamics Standards
Published 2012Full text (MFA users only)
Electronic eBook -
80
Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...
Published 2011Table of Contents: “…Solder Selection of Lead-Free Reflow Soldering and Optimization of Craft CurveLow Reflectivity ErAlO Film on Si as Anti-Reflecting Coating in Solar Cells; Genesis Analysis of Common Defects of Reflow Soldering and Research for Solutions; Key Parameter Optimization in Wave Soldering; A Dynamic Clustering Querying Algorithm Based on Grid in Manufacturing System; Design of Accelerator in Wind Power Generator with Creative Mechanical Design Methodology; Analyze of Traditional Clothing Manufacturing Technology and Five Traditional Colors Based on Management Principle…”
Full text (MFA users only)
Electronic Conference Proceeding eBook