Search Results - (((((((ant OR wkant) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 56
- Data processing 54
- Mathematics 43
- Mathematical models 37
- artificial intelligence 30
- Machine learning 28
- Mathematical optimization 26
- Algorithms 25
- Data mining 24
- Technological innovations 22
- Artificial Intelligence 21
- algorithms 21
- Social aspects 19
- Computer networks 17
- History 15
- Information technology 15
- Computer science 14
- Big data 13
- Computer algorithms 13
- Python (Computer program language) 13
- Data Mining 12
- Digital techniques 12
- Image processing 12
- Research 12
- Statistical methods 12
- methods 12
- Design and construction 11
- Engineering 11
- Management 11
- Decision making 10
Search alternatives:
- ant »
- wkant »
- semantic »
- cantor »
-
221
Prognostics and Health Management of Engineering Systems : an Introduction.
Published 2016Table of Contents: “…2.2.2 When a Degradation Model Is Available (Physics-Based Approaches)2.2.2.1 Problem Definition; 2.2.2.2 Parameter Estimation and Degradation Prediction; 2.2.2.3 Effect of Noise in Data; 2.2.3 When a Degradation Model Is NOT Available (Data-Driven Approaches); 2.2.3.1 Function Evaluation; 2.2.3.2 Overfitting; 2.2.3.3 Prognosis with More Training Data; 2.3 RUL Prediction; 2.3.1 RUL; 2.3.2 Prognostics Metrics; 2.3.2.1 Prognostic Horizon (PH); 2.3.2.2 varvec{ alpha { -- } lambda} Accuracy; 2.3.2.3 (Cumulative) Relative Accuracy (RA, CRA); 2.3.2.4 Convergence; 2.3.2.5 Results with MATLAB Code.…”
Full text (MFA users only)
Electronic eBook -
222
Multi-agent machine learning : a reinforcement approach
Published 2014Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
Full text (MFA users only)
Electronic eBook -
223
Radon Transforms and Tomography.
Published 2001Table of Contents: “…Expository Papers -- Local tomography and related problems -- Tomography problems arising in synthetic aperture radar -- Introduction to local tomography -- Algorithms in ultrasound tomography -- Radon transforms, differential equations, and microlocal analysis -- Supplementary bibliography to A bibliographic survey of the Pompeiu problem -- II. …”
Full text (MFA users only)
Electronic eBook -
224
Pervasive Computing in Cognitive Communications Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
Full text (MFA users only)
eBook -
225
Analysis of biological data : a soft computing approach
Published 2007Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
Full text (MFA users only)
Electronic eBook -
226
Smart intelligent computing and communication technology
Published 2021Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
227
Reconstructing evolution : new mathematical and computational advances
Published 2007Full text (MFA users only)
Electronic eBook -
228
Smart buildings, smart communities and demand response
Published 2021Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
Full text (MFA users only)
Electronic eBook -
229
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
230
Numerical methods for viscosity solutions and applications
Published 2001Full text (MFA users only)
Electronic eBook -
231
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
232
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
233
-
234
Empirical Evaluation Methods in Computer Vision.
Published 2002Table of Contents: “…Foreword ; Chapter 1 Automated Performance Evaluation of Range Image Segmentation Algorithms ; 1.1. Introduction ; 1.2. Scoring the Segmented Regions ; 1.3. …”
Full text (MFA users only)
Electronic eBook -
235
-
236
Foundations of constraint satisfaction
Published 1993Table of Contents: “…Solution synthesis; 9.1 Introduction; 9.2 Freuder's Solution Synthesis Algorithm; 9.3 Seidel's Invasion Algorithm; 9.4 The Essex Solution Synthesis Algorithms; 9.5 When to Synthesize Solutions; 9.6 Concluding Remarks; 9.7 Bibliographical Remarks; Chapter 10. …”
Full text (MFA users only)
Electronic eBook -
237
Signal Design for Modern Radar Systems.
Published 2022Table of Contents: “…Intro -- Introduction -- Practical Signal Design -- The Why -- The How -- The What -- Radar Application Focus Areas -- Designing Signals with Good Correlation Properties -- Signal Design to Enhance SINR -- Spectral Shaping and Coexistence with Communications -- Automotive Radar Signal Processing and Sensing for Autonomous Vehicles -- What this Book Offers -- References -- Convex and Nonconvex Optimization -- Optimization Algorithms -- Gradient Descent Algorithm -- Newton's Method -- Mirror Descent Algorithm -- Power Method-Like Iterations -- Majorization-Minimization Framework…”
Full text (MFA users only)
Electronic eBook -
238
Design studies and intelligence engineering
Published 2022Table of Contents: “…Intro -- Title Page -- Preface -- Contents -- PSIC3839: Predicting the Overall Emotion and Depth of Entire Songs -- Research on Noise Control of Product Symbol Communication Channel-Take a Small Rice Mill for Example -- Towards Better Data Pre-Processing for Building Recipe Recommendation Systems from Industrial Fabric Dyeing Manufacturing Records: Categorization of Coloration Properties for a Dye Combination on Different Fabrics -- A Multi-Robot Planning Algorithm with Quad Tree Map Division for Obstacles of Irregular Shape…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
239
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
240
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook