Search Results - (((((((ante OR anti) OR cantee) OR art) OR cantor) OR anne) OR wares) OR hints) algorithms.

  1. 161
  2. 162

    Fuzzy neural network theory and application by Liu, Puyin

    Published 2004
    Table of Contents: “…Chapter II Fuzzy Neural Networks for Storing and ClassifyingS2.1 Two layer max-min fuzzy associative memory; 2.1.1 FAM with threshold; 2.1.2 Simulation example; S2.2 Fuzzy 6-learning algorithm; 2.2.1 FAM's based on 'V -- / '; 2.2.2 FAM's based on 'V -- *'; S2.3 BP learning algorithm of FAM's; 2.3.1 Two analytic functions; 2.3.2 BP learning algorithm; S2.4 Fuzzy ART and fuzzy ARTMAP; 2.4.1 ART1 architecture; 2.4.2 Fuzzy ART; 2.4.3 Fuzzy ARTMAP; 2.4.4 Real examples; References; Chapter III Fuzzy Associative Memory-Feedback Networks; S3.1 Fuzzy Hopfield networks.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Photography from the Turin Shroud to the Turing Machine. by Toister, Yanai

    Published 2019
    Table of Contents: “…The Landscapes of Code -- 5. Photography as Algorithmic Art -- Conclusion -- References -- Index -- Back Cover…”
    Full text (MFA users only)
    eBook
  4. 164

    DSP with Python Programming. by Charbit, Maurice

    Published 2017
    Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...

    Published 2011
    Table of Contents: “…Solder Selection of Lead-Free Reflow Soldering and Optimization of Craft CurveLow Reflectivity ErAlO Film on Si as Anti-Reflecting Coating in Solar Cells; Genesis Analysis of Common Defects of Reflow Soldering and Research for Solutions; Key Parameter Optimization in Wave Soldering; A Dynamic Clustering Querying Algorithm Based on Grid in Manufacturing System; Design of Accelerator in Wind Power Generator with Creative Mechanical Design Methodology; Analyze of Traditional Clothing Manufacturing Technology and Five Traditional Colors Based on Management Principle…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 166

    Advanced Printing and Packaging Materials and Technologies

    Published 2015
    Table of Contents: “…An Automatic Calculation Method of MTF and the Application in Blurred Images Restoration; An Image Anti-Forgery Algorithm Based on Conceal Zone Special Halftoning; An Improved Print-Scan Resistant Watermarking Scheme; Research on the Character and Line Quality Evaluation Model Based on Human Visual System; Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph; A Novel Approach of Edge Detection Based on Gray Correlation Degree and Kirsch Operator; A Novel Digital Watermark Algorithm Based on a Fingerprint Image.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 167

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  9. 169
  10. 170

    Polynomial root-finding and polynomiography by Kalantari, Bahman

    Published 2009
    Table of Contents: “…Approximation of square-roots and their visualizations -- The fundamental theorem of algebra and a special case of Taylor's theorem -- Introduction to the basic family and polynomiography -- Equivalent formulations of the basic family -- Basic family as dynamical system -- Fixed points of the basic family -- Algebraic derivation of the basic family and characterizations -- The truncated basic family and the case of Halley family -- Characterizations of solutions of homogeneous linear recurrence relations -- Generalization of Taylor's theorem and Newton's method -- The multipoint basic family and its order of convergence -- A computational study of the multipoint basic family -- A general determinantal lower bound -- Formulas for approximation of pi based on root-finding algorithms -- Bounds on roots of polynomials and analytic functions -- A geometric optimization and its algebraic offsprings -- Polynomiography : algorithms for visualization of polynomial equations -- Visualization of homogeneous linear recurrence relations -- Applications of polynomiography in art, education, science, and mathematics -- Approximation of square-roots revisited -- Further applications and extensions of the basic family and polynomiography.…”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Automata and Computability. by Kozen, Dexter, 1951-

    Published 1997
    Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Analysis of biological data : a soft computing approach

    Published 2007
    Table of Contents: “…Reconstructing phylogenies with memetic algorithms and branch-and-bound / José E. Gallardo, Carlos Cotta and Antonio J. …”
    Full text (MFA users only)
    Electronic eBook
  13. 173
  14. 174

    Data Analytics Applied to the Mining Industry. by Soofastaei, Ali

    Published 2020
    Table of Contents: “…Advanced Data Analytics -- Introduction -- Big Data -- Analytics -- Deep Learning -- CNNs -- Deep Neural Network -- Recurrent Neural Network (RNN) -- ML -- Fuzzy Logic -- Classification Techniques -- Clustering -- Evolutionary Techniques -- Genetic Algorithms (GAs) -- Ant Colony Optimization (ACO)…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Pattern Recognition in Computational Molecular Biology : Techniques and Approaches by Elloumi, Mourad, Iliopoulos, Costas, Wang, Jason T. L., Zomaya, Albert Y.

    Published 2015
    Table of Contents: “…Wiley Series; Title Page; Copyright; Table of Contents; List of Contributors; Preface; Part 1: Pattern Recognition in Sequences; Chapter 1: Combinatorial Haplotyping Problems; 1.1 Introduction; 1.2 Single Individual Haplotyping; 1.3 Population Haplotyping; References; Chapter 2: Algorithmic Perspectives of the String Barcoding Problems; 2.1 Introduction; 2.2 Summary of Algorithmic Complexity Results for Barcoding Problems; 2.3 Entropy-Based Information Content Technique for Designing Approximation Algorithms for String Barcoding Problems.…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Pattern recognition by Theodoridis, Sergios, 1951-

    Published 2006
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 179

    Key engineering materials

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  20. 180