Search Results - (((((((anti OR wkant) OR semantic) OR wien) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 181

    Big Data, IoT, and Machine Learning : Tools and Applications. by Agrawal, Rashmi

    Published 2020
    Table of Contents: “…Chapter 3 Reviews Analysis of Apple Store Applications Using Supervised Machine Learning -- 3.1 Introduction -- 3.2 Literature Review -- 3.2.1 Machine Learning Algorithms -- 3.2.2 Feature Extraction Algorithms -- 3.3 Proposed Methodology -- 3.3.1 Data Collection -- 3.3.2 Feature Extraction -- 3.3.3 Data Analysis and Sentiment Analysis -- Text Processing -- 3.3.4 Text Normalisation -- 3.4 Feature Extraction Algorithm -- 3.4.1 CountVectorizer -- 3.4.2 TfidfVectorizer (TF-IDF) -- 3.5 Supervised ML Classification -- 3.6 Experiment Design -- 3.7 Experimental Results and Analysis…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Principles of artificial neural networks by Graupe, Daniel

    Published 2013
    Table of Contents: “…Fundamentals of biological neural networks -- ch. 3. Basic principles of ANNs and their early structures. 3.1. Basic principles of ANN design. 3.2. …”
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…Problem Description -- 3. The FUP Algorithm for the Insertion Only Case -- 4. The FUP Algorithm for the Deletions Only Case -- 5. …”
    Full text (MFA users only)
    Electronic eBook
  4. 184

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  5. 185
  6. 186

    Advanced Artificial Intelligence.

    Published 2011
    Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 188

    Web-based learning : men and machines - proceedings of the first international conference on web-based learning in china (icwl 2002). by REGGIE, KWAN

    Published 2002
    Table of Contents: “…Patterns of Web Based Learning in the Semantic Web Era ; PART THREE Tools.…”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Internet+ and electronic business in China : innovation and applications

    Published 2018
    Table of Contents: “…Emotional analysis of online reviews on e-business platforms -- Chapter 14. Semantic search of online reviews on e-business platforms -- Part IV. …”
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Deep Learning Quick Reference : Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras. by Bernico, Michael

    Published 2018
    Table of Contents: “…Drawbacks to consider when using a neural network for regressionUsing deep neural networks for regression; How to plan a machine learning problem; Defining our example problem; Loading the dataset; Defining our cost function; Building an MLP in Keras; Input layer shape; Hidden layer shape; Output layer shape; Neural network architecture; Training the Keras model; Measuring the performance of our model; Building a deep neural network in Keras; Measuring the deep neural network performance; Tuning the model hyperparameters; Saving and loading a trained Keras model; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  12. 192
  13. 193

    Technologies for Engineering Manufacturing Systems Control in Closed Loop. by Preuße, Sebastian

    Published 2013
    Table of Contents: “…Intro; 1 Introduction; 2 Basic Principles; 2.1 Technologies for studying Behavior; 2.2 Plants; 2.3 Controllers; 2.3.1 IEC 61131-3; 2.3.2 IEC 61499-1; 2.4 System Models; 2.4.1 Syntax; 2.4.2 Semantics; 2.5 Basics of Specifications; 2.5.1 Computation Tree Logic; 2.5.2 Extended Computation Tree Logic; 2.5.3 Timed Computation Tree Logic; 2.5.4 Symbolic Timing Diagrams; 2.6 Closed-Loop Composition; 2.7 Model Checking; 2.7.1 General Remarks; 2.7.2 Model Checking Algorithm; 2.8 Summary; 3 Formal Modeling of Plant, Controller, and the Closed Loop; 3.1 Demonstration Example; 3.2 Formal Plant Modeling.…”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Solutions in lidar profiling of the atmosphere by Kovalev, Vladimir A.

    Published 2015
    Table of Contents: “…1.6.1 Algorithm and Solution Uncertainty1.6.2 Numerical Simulations and Experimental Data; 1.7 Examination of the Remaining Offset in the Backscatter Signal by~Analyzing the Shape of the Integrated Signal; 1.8 Issues in the Examination of the Lidar Overlap Function; 1.8.1 Influence of Distortions in the Lidar Signal when Determining the~Overlap Function; 1.8.2 Issues of Lidar Signal Inversion within the Incomplete Overlap Area; Chapter 2 Essentials and Issues in Separating the Backscatter and Transmission Terms in The Lidar Equation.…”
    Full text (MFA users only)
    Electronic eBook
  15. 195
  16. 196

    Parts-feeding systems for assembly : organisation, logistics and automation

    Published 2015
    Table of Contents: “…A model for kitting operations planningRobust optimization approach to production system with failure in rework and breakdown under uncertainty: evolutionary methods; Re-layout of an assembly area: a case study at Bosch Rexroth Oil Control; A simple mechanical measurement system for the posture evaluation of wing components using the PSO and ICP algorithms; Implementation framework for a fully flexible assembly system (F-FAS); A genetic algorithm for supermarket location problem; New Kanban model for tow-train feeding system design.…”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    3D face modeling, analysis and recognition by Daoudi, Mohamed, Ph. D., Srivastava, Anuj, Veltkamp, Remco C., 1963-

    Published 2013
    Table of Contents: “…3.5.4 Extension to Facial Surfaces Shape Analysis3.6 The Dense Scalar Field (DSF); 3.7 Statistical Shape Analysis; 3.7.1 Statistics on Manifolds: Karcher Mean; 3.7.2 Learning Statistical Models in Shape Space; 3.8 Applications of Statistical Shape Analysis; 3.8.1 3D Face Restoration; 3.8.2 Hierarchical Organization of Facial Shapes; 3.9 The Iso-geodesic Stripes; 3.9.1 Extraction of Facial Stripes; 3.9.2 Computing Relationships between Facial Stripes; 3.9.3 Face Representation and Matching Using Iso-geodesic Stripes; Exercises; Glossary; References.…”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Wavelet theory approach to pattern recognition

    Published 2009
    Table of Contents: “…Comparison with other wavelets. 7.4. Algorithm and experiments -- ch. 8. Skeletonization of ribbon-like shapes with new wavelet function. 8.1. …”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Robot Intelligence for Coordinated Manipulation and Its Industrial Application. by Yang, Chenguang

    Published 2020
    Table of Contents: “…Cover -- Guest editorial -- A conceptual scale model of mobile drilling robot -- Dynamic characteristics of a jumping robot with coordinated quadruped legs -- Identification of nonlinear state-space time-delay system -- An end-to-end learning method for industrial defect detection -- One-shot gesture recognition with attention based DTW for human-robot collaboration -- Wirerope-driven exoskeleton to assist lower-limb rehabilitation of hemiplegic patients by using motion capture -- Effective anti-collision algorithms for RFID robots system…”
    Full text (MFA users only)
    eBook
  20. 200

    International e-Conference of Computer Science 2006

    Published 2007
    Table of Contents: “…A Computational Algorithm to Obtain the Law of the Solvable Lie Algebra of n x n Upper-Triangular MatricesWeb Data Extraction using Semantic Generators -- Integrity-Enhanced Improvements for ISO 9001 registeredOrganizations -- A Ghost Bit Based Finite Field Arithmetic for FPGAs -- A Scalable Finite Field Multiplier with Interleaving Reduction -- Intelligent Tutoring Systems and Convex Geometries -- Towards Operational Content Infrastructure -- A Computational Fusion of Wavelets and Neural Networks in a Classifier for Biomedical Applications…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook