Search Results - (((((((ant OR wind) OR semantic) OR arte) OR ckantor) OR anne) OR maarten) OR mantis) algorithms.

  1. 201

    Advanced Methods and Technologies for Agent and Multi-Agent Systems. by Edited by

    Published 2013
    Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
    Full text (MFA users only)
    Electronic eBook
  2. 202

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  3. 203

    Fuzzy neural network theory and application by Liu, Puyin

    Published 2004
    Table of Contents: “…Chapter II Fuzzy Neural Networks for Storing and ClassifyingS2.1 Two layer max-min fuzzy associative memory; 2.1.1 FAM with threshold; 2.1.2 Simulation example; S2.2 Fuzzy 6-learning algorithm; 2.2.1 FAM's based on 'V -- / '; 2.2.2 FAM's based on 'V -- *'; S2.3 BP learning algorithm of FAM's; 2.3.1 Two analytic functions; 2.3.2 BP learning algorithm; S2.4 Fuzzy ART and fuzzy ARTMAP; 2.4.1 ART1 architecture; 2.4.2 Fuzzy ART; 2.4.3 Fuzzy ARTMAP; 2.4.4 Real examples; References; Chapter III Fuzzy Associative Memory-Feedback Networks; S3.1 Fuzzy Hopfield networks.…”
    Full text (MFA users only)
    Electronic eBook
  4. 204

    Photography from the Turin Shroud to the Turing Machine. by Toister, Yanai

    Published 2019
    Table of Contents: “…The Landscapes of Code -- 5. Photography as Algorithmic Art -- Conclusion -- References -- Index -- Back Cover…”
    Full text (MFA users only)
    eBook
  5. 205

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  6. 206

    Hierarchical Protection for Smart Grids. by Ma, Jing

    Published 2018
    Table of Contents: “…3.3 Local Area Protection for Centralized Renewable Energy3.3.1 Connection Form of a Wind Farm and its Protection Configuration; 3.3.2 Adaptive Distance Protection Scheme for Wind Farm Collector Lines; 3.3.3 Differential Protection Scheme for Wind Farm Outgoing Transmission Line; 3.4 Local Area Protection for Distributed Renewable Energy; 3.4.1 Adaptive Protection Approach for a Distribution Network Containing Distributed Generation; 3.4.2 Islanding Detection Method; 3.5 Summary; References; Chapter 4 Topology Analysis; 4.1 Introduction; 4.2 Topology Analysis for the Inner Substation.…”
    Full text (MFA users only)
    Electronic eBook
  7. 207

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  8. 208

    Monte Carlo methods and applications : proceedings of the 8th IMACS Seminar on Monte Carlo Methods, August 29-September 2, 2011, Borovets, Bulgaria

    Published 2013
    Table of Contents: “…9.3 General Description of the Coupled Atmosphere Fire Modeling and WRF-Fire9.4 Wind Simulation Approach; 9.5 Conclusion; 10 Wireless Sensor Network Layout; 10.1 Introduction; 10.2 Wireless Sensor Network Layout Problem; 10.3 ACO for WSN Layout Problem; 10.4 Experimental Results; 10.5 Conclusion; 11 A Two-Dimensional Lorentzian Distribution for an Atomic Force Microscopy Simulator; 11.1 Introduction; 11.2 Modeling Oxidation Kinetics; 11.3 Development of the Lorentzian Model; 11.3.1 Algorithm for the Gaussian Model; 11.3.2 Development of the Lorentzian Model; 11.4 Conclusion.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 209

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  10. 210

    Metaheuristics for vehicle routing problems. by Labadie, Nacima

    Published 2015
    Table of Contents: “…Memetic algorithm; 4.1.3. Memetic algorithm with population management; 4.1.4. …”
    Full text (MFA users only)
    Electronic eBook
  11. 211

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  12. 212
  13. 213

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  14. 214

    Polynomial root-finding and polynomiography by Kalantari, Bahman

    Published 2009
    Table of Contents: “…Approximation of square-roots and their visualizations -- The fundamental theorem of algebra and a special case of Taylor's theorem -- Introduction to the basic family and polynomiography -- Equivalent formulations of the basic family -- Basic family as dynamical system -- Fixed points of the basic family -- Algebraic derivation of the basic family and characterizations -- The truncated basic family and the case of Halley family -- Characterizations of solutions of homogeneous linear recurrence relations -- Generalization of Taylor's theorem and Newton's method -- The multipoint basic family and its order of convergence -- A computational study of the multipoint basic family -- A general determinantal lower bound -- Formulas for approximation of pi based on root-finding algorithms -- Bounds on roots of polynomials and analytic functions -- A geometric optimization and its algebraic offsprings -- Polynomiography : algorithms for visualization of polynomial equations -- Visualization of homogeneous linear recurrence relations -- Applications of polynomiography in art, education, science, and mathematics -- Approximation of square-roots revisited -- Further applications and extensions of the basic family and polynomiography.…”
    Full text (MFA users only)
    Electronic eBook
  15. 215

    Learning-based local visual representation and indexing by Rongrong, Ji, Yao, Hongxun, Gao, Yue, Duan, Ling-Yu, Dai, Qionghai

    Published 2014
    Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
    Full text (MFA users only)
    Electronic eBook
  16. 216

    Automatic Text Summarization by Torres-Moreno, Juan-Manuel

    Published 2014
    Table of Contents: “…Machine learning approaches; 3.3. State-of-the-art approaches; 3.4. Latent semantic analysis; 3.5. …”
    Full text (MFA users only)
    Electronic eBook
  17. 217

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 218
  19. 219

    Bridge health monitoring, maintenance and safety : special topic volume with invited peer reviewed papers only

    Published 2011
    Table of Contents: “…Modal test and analysis of a bridge under the varying temperature condition -- Bridge significant failure mode identification strategy under traffic-load -- Fatigue reliability analysis of the stay cables of cable-stayed bridge under combined loads of stochastic traffic and wind -- Updating the finite element model of a bridge model using a hybrid optimization method -- An improved Taguchi method and its application in finite element model updating of bridges -- Nonlinear seismic response analysis of half through CFST arch bridge under 3-D earthquake waves -- Simplified seismic response assessment method and parametric study of multi-girder skew bridges -- Seismic testing of a long-span concrete filled steel tubular arch bridge -- Study on finite element model of bridge multi-pile foundation -- Sensor optimal placement for bridge structure based on single parents genetic algorithm with different fitness functions.…”
    Full text (MFA users only)
    Electronic eBook
  20. 220

    Java programming interviews exposed by Markham, Noel

    Published 2014
    Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
    Full text (MFA users only)
    Electronic eBook