Search Results - (((((((anti OR wiant) OR semantic) OR win) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 40
- Data processing 30
- Mathematics 23
- Mathematical models 21
- Technological innovations 20
- Machine learning 19
- artificial intelligence 19
- Algorithms 18
- Data mining 17
- Management 15
- algorithms 15
- Computer science 14
- Information technology 13
- Big data 12
- Computer networks 12
- Artificial Intelligence 11
- Computer algorithms 11
- Social aspects 11
- Diseases 9
- Research 9
- methods 9
- Automatic control 8
- Computational linguistics 8
- Materials 8
- Neural networks (Computer science) 8
- Political aspects 8
- Computer security 7
- Data Mining 7
- Decision making 7
- Development 7
Search alternatives:
-
161
Advanced Printing and Packaging Materials and Technologies
Published 2015Table of Contents: “…An Automatic Calculation Method of MTF and the Application in Blurred Images Restoration; An Image Anti-Forgery Algorithm Based on Conceal Zone Special Halftoning; An Improved Print-Scan Resistant Watermarking Scheme; Research on the Character and Line Quality Evaluation Model Based on Human Visual System; Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph; A Novel Approach of Edge Detection Based on Gray Correlation Degree and Kirsch Operator; A Novel Digital Watermark Algorithm Based on a Fingerprint Image.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
162
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
163
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
164
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
165
Resources utilization and productivity enhancement case studies
Published 2015Full text (MFA users only)
Electronic eBook -
166
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
167
Automata and Computability.
Published 1997Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
Full text (MFA users only)
Electronic eBook -
168
Mathematical morphology and its applications to image and signal processing
Published 2000Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
169
Learning-based local visual representation and indexing
Published 2014Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
Full text (MFA users only)
Electronic eBook -
170
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
171
Big Data, IoT, and Machine Learning : Tools and Applications.
Published 2020Table of Contents: “…Chapter 3 Reviews Analysis of Apple Store Applications Using Supervised Machine Learning -- 3.1 Introduction -- 3.2 Literature Review -- 3.2.1 Machine Learning Algorithms -- 3.2.2 Feature Extraction Algorithms -- 3.3 Proposed Methodology -- 3.3.1 Data Collection -- 3.3.2 Feature Extraction -- 3.3.3 Data Analysis and Sentiment Analysis -- Text Processing -- 3.3.4 Text Normalisation -- 3.4 Feature Extraction Algorithm -- 3.4.1 CountVectorizer -- 3.4.2 TfidfVectorizer (TF-IDF) -- 3.5 Supervised ML Classification -- 3.6 Experiment Design -- 3.7 Experimental Results and Analysis…”
Full text (MFA users only)
Electronic eBook -
172
Knowledge discovery for business information systems
Published 2001Table of Contents: “…Problem Description -- 3. The FUP Algorithm for the Insertion Only Case -- 4. The FUP Algorithm for the Deletions Only Case -- 5. …”
Full text (MFA users only)
Electronic eBook -
173
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
174
High Performance Computing Systems and Applications & OSCAR Symposium.
Published 2003Table of Contents: “…""The Impact of Hyper-Threading on Communication Performance in HPC Clusters""""A Preliminary Feasibility Study of the LARPBS Optical Bus Parallel Model""; ""Efficient Broadcast on Computational Grids""; ""The Canadian Internetworked Scientific Supercomputer""; ""Distributed Beagle: An Environment for Parallel and Distributed Evolutionary Computations""; ""A Brief Introduction to UPC""; ""SCOJO -- Share-Based Job Coscheduling with Integrated Dynamic Resource Directory in Support Or Grid Scheduling""…”
Full text (MFA users only)
Electronic eBook -
175
Web-based learning : men and machines - proceedings of the first international conference on web-based learning in china (icwl 2002).
Published 2002Table of Contents: “…Patterns of Web Based Learning in the Semantic Web Era ; PART THREE Tools.…”
Full text (MFA users only)
Electronic eBook -
176
Internet+ and electronic business in China : innovation and applications
Published 2018Table of Contents: “…Emotional analysis of online reviews on e-business platforms -- Chapter 14. Semantic search of online reviews on e-business platforms -- Part IV. …”
Full text (MFA users only)
Electronic eBook -
177
-
178
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
179
Technologies for Engineering Manufacturing Systems Control in Closed Loop.
Published 2013Table of Contents: “…Intro; 1 Introduction; 2 Basic Principles; 2.1 Technologies for studying Behavior; 2.2 Plants; 2.3 Controllers; 2.3.1 IEC 61131-3; 2.3.2 IEC 61499-1; 2.4 System Models; 2.4.1 Syntax; 2.4.2 Semantics; 2.5 Basics of Specifications; 2.5.1 Computation Tree Logic; 2.5.2 Extended Computation Tree Logic; 2.5.3 Timed Computation Tree Logic; 2.5.4 Symbolic Timing Diagrams; 2.6 Closed-Loop Composition; 2.7 Model Checking; 2.7.1 General Remarks; 2.7.2 Model Checking Algorithm; 2.8 Summary; 3 Formal Modeling of Plant, Controller, and the Closed Loop; 3.1 Demonstration Example; 3.2 Formal Plant Modeling.…”
Full text (MFA users only)
Electronic eBook -
180