Search Results - (((((((anti OR wkant) OR semantic) OR wien) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 121

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  2. 122

    OIPE 2012

    Published 2014
    Table of Contents: “…Optimization of EMI filters for electrical drives in aircraftAdaptive level set method for accurate boundary shape in optimization of electromagnetic systems; Amodified immune algorithm with spatial filtering for multiobjective topology optimisation of electromagnetic devices; Use of compensation theorem for the robustness assessment of electromagnetic devices optimal design; Multi-physics optimisation of an energy harvester device for automotive application; Stochastic modeling error reduction using Bayesian approach coupled with an adaptive Kriging-based model.…”
    Full text (MFA users only)
    Electronic eBook
  3. 123

    Cybernetic Intelligence

    Published 2005
    Table of Contents: “…Editorial advisory board; Preface; Editorial; Second-order cybernetics and enactive perception; Semantic category theory cognition and conceptual reference; Bipolar logic and probabilistic interpretation; Cooperative clans; Future reasoning machines: mind and body; Machine vision methods for autonomous micro-robotic systems; Optimisation enhancement using self-organising fuzzy control; Intelligent agents and distributed models for cooperative task support; Landscape classification and problem specific reasoning for genetic algorithms; Business cybernetics: a provocative suggestion.…”
    Full text (MFA users only)
    Electronic eBook
  4. 124

    Language engineering for lesser-studied languages

    Published 2009
    Table of Contents: “…Derzhanski -- Computational morphology for lesser-studied languages / Kemal Olfazer -- Practical syntastic processing of flexible word order languages with dynamic syntax / David Tugwell -- Computation field semantics : acquiring an ontological-semantic lexicon for a new language / Sergei Nirenburg and Marjorie McShane -- Applying machine translation for low- and middle-density languages / Stella Markantonatou [and others] -- Language resources for semitic languages : challenges and solutions / Shuly Wintner -- Low-density language strategies for Persian and Armenian / Karine Megerdoomian.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 125

    Theory of information : fundamentality, diversity and unification by Burgin, M. S. (Mark Semenovich)

    Published 2010
    Table of Contents: “…Algorithmic information theory based on recursive algorithms : recursive approach. 5.3. …”
    Full text (MFA users only)
    Electronic eBook
  6. 126

    Handbook of Computational Geometry. by Sack, J. R.

    Published 1999
    Table of Contents: “…Arrangements and their applications; Chapter 3. Discrete geometric shapes: Matching, interpolation, and approximation; Chapter 4. …”
    Full text (MFA users only)
    Electronic eBook
  7. 127

    The NURBS Book by Piegl, Les

    Published 1997
    Table of Contents: “…One Curve and Surface Basics -- 1.1 Implicit and Parametric Forms -- 1.2 Power Basis Form of a Curve -- 1.3 Bézier Curves -- 1.4 Rational Bézier Curves -- 1.5 Tensor Product Surfaces -- Exercises -- Two B-Spline Basis Functions -- 2.1 Introduction -- 2.2 Definition and Properties of B-spline Basis Functions -- 2.3 Derivatives of B-spline Basis Functions -- 2.4 Further Properties of the Basis Functions -- 2.5 Computational Algorithms -- Exercises -- Three B-spline Curves and Surfaces -- 3.1 Introduction -- 3.2 The Definition and Properties of B-spline Curves -- 3.3 The Derivatives of a B-spline Curve -- 3.4 Definition and Properties of B-spline Surfaces -- 3.5 Derivatives of a B-spline Surface -- Exercises -- Four Rational B-spline Curves and Surfaces -- 4.1 Introduction -- 4.2 Definition and Properties of NURBS Curves -- 4.3 Derivatives of a NURBS Curve -- 4.4 Definition and Properties of NURBS Surfaces -- 4.5 Derivatives of a NURBS Surface -- Exercises -- Five Fundamental Geometric Algorithms -- 5.1 Introduction -- 5.2 Knot Insertion -- 5.3 Knot Refinement -- 5.4 Knot Removal -- 5.5 Degree Elevation -- 5.6 Degree Reduction -- Exercises -- Six Advanced Geometric Algorithms -- 6.1 Point Inversion and Projection for Curves and Surfaces -- 6.2 Surface Tangent Vector Inversion -- 6.3 Transformations and Projections of Curves and Surfaces -- 6.4 Reparameterization of NURBS Curves and Surfaces -- 6.5 Curve and Surface Reversal -- 6.6 Conversion Between B-spline and Piecewise Power Basis Forms -- Exercises -- Seven Conics and Circles -- 7.1 Introduction -- 7.2 Various Forms for Representing Conics -- 7.3 The Quadratic Rational Bézier Arc -- 7.4 Infinite Control Points -- 7.5 Construction of Circles -- 7.6 Construction of Conies -- 7.7 Conic Type Classification and Form Conversion -- 7.8 Higher Order Circles -- Exercises -- Eight Construction of Common Surfaces -- 8.1 Introduction -- 8.2 Bilinear Surfaces -- 8.3 The General Cylinder -- 8.4 The Ruled Surface -- 8.5 The Surface of Revolution -- 8.6 Nonuniform Scaling of Surfaces -- 8.7 A Three-sided Spherical Surface -- Nine Curve and Surface Fitting -- 9.1 Introduction -- 9.2 Global Interpolation -- 9.3 Local Interpolation -- 9.4 Global Approximation -- 9.5 Local Approximation -- Exercises -- Ten Advanced Surface Construction Techniques -- 10.1 Introduction -- 10.2 Swung Surfaces -- 10.3 Skinned Surfaces -- 10.4 Swept Surfaces -- 10.5 Interpolation of a Bidirectional Curve Network -- 10.6 Coons Surfaces -- Eleven Shape Modification Tools -- 11.1 Introduction -- 11.2 Control Point Repositioning -- 11.3 Weight Modification -- 11.4 Shape Operators -- 11.5 Constraint-based Curve and Surface Shaping -- Twelve Standards and Data Exchange -- 12.1 Introduction -- 12.2 Knot Vectors -- 12.3 Nurbs Within the Standards -- 12.4 Data Exchange to and from a NURBS System -- Thirteen B-spline Programming Concepts -- 13.1 Introduction -- 13.2 Data Types and Portability -- 13.3 Data Structures -- 13.4 Memory Allocation -- 13.5 Error Control -- 13.6 Utility Routines -- 13.7 Arithmetic Routines -- 13.8 Example Programs -- 13.9 Additional Structures -- 13.10 System Structure -- References.…”
    Full text (MFA users only)
    Electronic eBook
  8. 128
  9. 129

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  10. 130
  11. 131
  12. 132

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  13. 133

    Applied modelling, numerical simulation, computation and optimization. by De Souza Neto, Eduardo

    Published 2017
    Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
    Full text (MFA users only)
    Electronic eBook
  14. 134

    Firewall design and analysis by Liu, Alex X.

    Published 2011
    Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
    Full text (MFA users only)
    Electronic eBook
  15. 135

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  16. 136

    Ivor Horton's beginning Visual C++ 2012 by Horton, Ivor

    Published 2012
    Table of Contents: “…Algorithms --…”
    Full text (MFA users only)
    Electronic eBook
  17. 137

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  18. 138

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  19. 139

    Digital holography by Picart, Pascal

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  20. 140

    Learning Boost C++ libraries : solve practical programming problems using powerful, portable, and expressive libraries from Boost by Mukherjee, Arindam

    Published 2015
    Table of Contents: “…Shared ownership semanticsboost::shared_ptr and std::shared_ptr; Intrusive smart pointers -- boost::intrusive_ptr; shared_array; Managing non-memory resources using smart pointers; Self-test questions; Summary; References; Chapter 4: Working with Strings; Text processing with Boost String Algorithms library; Using Boost String Algorithms; Find algorithms; Case-conversion and trimming algorithms; The replace and erase algorithms; The split and join algorithms; Splitting text using the Boost Tokenizer library; Tokenizing based on separators…”
    Full text (MFA users only)
    Electronic eBook