Search Results - (((((((anti OR wkant) OR semantic) OR wien) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 39
- Data processing 38
- Mathematics 32
- Mathematical models 26
- Technological innovations 19
- artificial intelligence 17
- Machine learning 16
- Algorithms 14
- Data mining 14
- Computer science 13
- Artificial Intelligence 12
- Social aspects 12
- Digital techniques 11
- Image processing 11
- Mathematical optimization 11
- Computer networks 10
- History 10
- Information technology 10
- algorithms 10
- Diseases 9
- Engineering 9
- Materials 9
- Mechanical engineering 9
- Big data 8
- Manufacturing processes 8
- Neural networks (Computer science) 8
- Pattern recognition systems 8
- Research 8
- Computational linguistics 7
- Computer graphics 7
Search alternatives:
-
121
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
122
OIPE 2012
Published 2014Table of Contents: “…Optimization of EMI filters for electrical drives in aircraftAdaptive level set method for accurate boundary shape in optimization of electromagnetic systems; Amodified immune algorithm with spatial filtering for multiobjective topology optimisation of electromagnetic devices; Use of compensation theorem for the robustness assessment of electromagnetic devices optimal design; Multi-physics optimisation of an energy harvester device for automotive application; Stochastic modeling error reduction using Bayesian approach coupled with an adaptive Kriging-based model.…”
Full text (MFA users only)
Electronic eBook -
123
Cybernetic Intelligence
Published 2005Table of Contents: “…Editorial advisory board; Preface; Editorial; Second-order cybernetics and enactive perception; Semantic category theory cognition and conceptual reference; Bipolar logic and probabilistic interpretation; Cooperative clans; Future reasoning machines: mind and body; Machine vision methods for autonomous micro-robotic systems; Optimisation enhancement using self-organising fuzzy control; Intelligent agents and distributed models for cooperative task support; Landscape classification and problem specific reasoning for genetic algorithms; Business cybernetics: a provocative suggestion.…”
Full text (MFA users only)
Electronic eBook -
124
Language engineering for lesser-studied languages
Published 2009Table of Contents: “…Derzhanski -- Computational morphology for lesser-studied languages / Kemal Olfazer -- Practical syntastic processing of flexible word order languages with dynamic syntax / David Tugwell -- Computation field semantics : acquiring an ontological-semantic lexicon for a new language / Sergei Nirenburg and Marjorie McShane -- Applying machine translation for low- and middle-density languages / Stella Markantonatou [and others] -- Language resources for semitic languages : challenges and solutions / Shuly Wintner -- Low-density language strategies for Persian and Armenian / Karine Megerdoomian.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
125
Theory of information : fundamentality, diversity and unification
Published 2010Table of Contents: “…Algorithmic information theory based on recursive algorithms : recursive approach. 5.3. …”
Full text (MFA users only)
Electronic eBook -
126
Handbook of Computational Geometry.
Published 1999Table of Contents: “…Arrangements and their applications; Chapter 3. Discrete geometric shapes: Matching, interpolation, and approximation; Chapter 4. …”
Full text (MFA users only)
Electronic eBook -
127
The NURBS Book
Published 1997Table of Contents: “…One Curve and Surface Basics -- 1.1 Implicit and Parametric Forms -- 1.2 Power Basis Form of a Curve -- 1.3 Bézier Curves -- 1.4 Rational Bézier Curves -- 1.5 Tensor Product Surfaces -- Exercises -- Two B-Spline Basis Functions -- 2.1 Introduction -- 2.2 Definition and Properties of B-spline Basis Functions -- 2.3 Derivatives of B-spline Basis Functions -- 2.4 Further Properties of the Basis Functions -- 2.5 Computational Algorithms -- Exercises -- Three B-spline Curves and Surfaces -- 3.1 Introduction -- 3.2 The Definition and Properties of B-spline Curves -- 3.3 The Derivatives of a B-spline Curve -- 3.4 Definition and Properties of B-spline Surfaces -- 3.5 Derivatives of a B-spline Surface -- Exercises -- Four Rational B-spline Curves and Surfaces -- 4.1 Introduction -- 4.2 Definition and Properties of NURBS Curves -- 4.3 Derivatives of a NURBS Curve -- 4.4 Definition and Properties of NURBS Surfaces -- 4.5 Derivatives of a NURBS Surface -- Exercises -- Five Fundamental Geometric Algorithms -- 5.1 Introduction -- 5.2 Knot Insertion -- 5.3 Knot Refinement -- 5.4 Knot Removal -- 5.5 Degree Elevation -- 5.6 Degree Reduction -- Exercises -- Six Advanced Geometric Algorithms -- 6.1 Point Inversion and Projection for Curves and Surfaces -- 6.2 Surface Tangent Vector Inversion -- 6.3 Transformations and Projections of Curves and Surfaces -- 6.4 Reparameterization of NURBS Curves and Surfaces -- 6.5 Curve and Surface Reversal -- 6.6 Conversion Between B-spline and Piecewise Power Basis Forms -- Exercises -- Seven Conics and Circles -- 7.1 Introduction -- 7.2 Various Forms for Representing Conics -- 7.3 The Quadratic Rational Bézier Arc -- 7.4 Infinite Control Points -- 7.5 Construction of Circles -- 7.6 Construction of Conies -- 7.7 Conic Type Classification and Form Conversion -- 7.8 Higher Order Circles -- Exercises -- Eight Construction of Common Surfaces -- 8.1 Introduction -- 8.2 Bilinear Surfaces -- 8.3 The General Cylinder -- 8.4 The Ruled Surface -- 8.5 The Surface of Revolution -- 8.6 Nonuniform Scaling of Surfaces -- 8.7 A Three-sided Spherical Surface -- Nine Curve and Surface Fitting -- 9.1 Introduction -- 9.2 Global Interpolation -- 9.3 Local Interpolation -- 9.4 Global Approximation -- 9.5 Local Approximation -- Exercises -- Ten Advanced Surface Construction Techniques -- 10.1 Introduction -- 10.2 Swung Surfaces -- 10.3 Skinned Surfaces -- 10.4 Swept Surfaces -- 10.5 Interpolation of a Bidirectional Curve Network -- 10.6 Coons Surfaces -- Eleven Shape Modification Tools -- 11.1 Introduction -- 11.2 Control Point Repositioning -- 11.3 Weight Modification -- 11.4 Shape Operators -- 11.5 Constraint-based Curve and Surface Shaping -- Twelve Standards and Data Exchange -- 12.1 Introduction -- 12.2 Knot Vectors -- 12.3 Nurbs Within the Standards -- 12.4 Data Exchange to and from a NURBS System -- Thirteen B-spline Programming Concepts -- 13.1 Introduction -- 13.2 Data Types and Portability -- 13.3 Data Structures -- 13.4 Memory Allocation -- 13.5 Error Control -- 13.6 Utility Routines -- 13.7 Arithmetic Routines -- 13.8 Example Programs -- 13.9 Additional Structures -- 13.10 System Structure -- References.…”
Full text (MFA users only)
Electronic eBook -
128
-
129
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
130
-
131
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
132
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
133
Applied modelling, numerical simulation, computation and optimization.
Published 2017Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
Full text (MFA users only)
Electronic eBook -
134
Firewall design and analysis
Published 2011Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
Full text (MFA users only)
Electronic eBook -
135
Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium
Published 2006Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
Full text (MFA users only)
Electronic eBook -
136
Ivor Horton's beginning Visual C++ 2012
Published 2012Table of Contents: “…Algorithms --…”
Full text (MFA users only)
Electronic eBook -
137
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
138
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
139
-
140
Learning Boost C++ libraries : solve practical programming problems using powerful, portable, and expressive libraries from Boost
Published 2015Table of Contents: “…Shared ownership semanticsboost::shared_ptr and std::shared_ptr; Intrusive smart pointers -- boost::intrusive_ptr; shared_array; Managing non-memory resources using smart pointers; Self-test questions; Summary; References; Chapter 4: Working with Strings; Text processing with Boost String Algorithms library; Using Boost String Algorithms; Find algorithms; Case-conversion and trimming algorithms; The replace and erase algorithms; The split and join algorithms; Splitting text using the Boost Tokenizer library; Tokenizing based on separators…”
Full text (MFA users only)
Electronic eBook