Search Results - (((((((anti OR wpanting) OR span) OR wants) OR cantor) OR anne) OR carter) OR wanting) algorithms.

  1. 61

    Text mining : applications and theory

    Published 2010
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 62
  3. 63

    F♯ for Machine Learning Essentials. by Mukherjee, Sudipta

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  4. 64

    Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence. by Kvasnicka, V.

    Published 2002
    Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
    Full text (MFA users only)
    Electronic eBook
  5. 65

    Power systems applications of graph theory by Zhu, Jizhong, 1961-

    Published 2009
    Table of Contents: “…Primal-Dual Algorithm; 4.4. MINIMUM SPANNING TREE; 4.4.1. Prim's Algorithm; 4.4.2. …”
    Full text (MFA users only)
    Electronic eBook
  6. 66

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  7. 67

    Industrial Engineering Foundations : Bridging the Gap Between Engineering and Management. by Sassani, Farrokh

    Published 2016
    Table of Contents: “…5.2 Definition of Scheduling Terms5.3 Scheduling Algorithms; 5.3.1 Objectives in Scheduling Problems; 5.3.2 Industrial Problems; 5.3.3 The Practice; 5.4 n-Job 1-Machine Problem; 5.4.1 Classification of Scheduling Problems; 5.5 Johnson's Algorithm; 5.6 Johnson's Extended Algorithm; 5.7 Jackson's Algorithm; 5.8 Akers' Algorithm; 5.9 The Branch and Bound Method; 5.9.1 Lower Bounds for Completion Time; 5.9.2 Branch and Bound Algorithm; 5.10 Mathematical Solutions; 5.11 Closing Remarks; Exercises; Chapter 6 Forecasting; 6.1 Introduction; 6.1.1 Pre-Forecasting Analysis; 6.1.2 Forecasting Horizon.…”
    Full text (MFA users only)
    Electronic eBook
  8. 68

    Visible Business : Uncover the Blindspots and Engage the World's Female Economy. by Brideson, RJ

    Published 2017
    Table of Contents: “…Blind Spots; Contents; Foreword; About the Author; Acknowledgements; To my community; To my village; Preface; Introduction; Chapter 1 From history to herstory; The birth of business marketing; Things have changed -- or have they?; Women want more; The wo-man algorithm; Become conscious of the bias; From reject to results; Chapter 2 Are you blind?…”
    Full text (MFA users only)
    Electronic eBook
  9. 69

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  10. 70

    Bridge health monitoring, maintenance and safety : special topic volume with invited peer reviewed papers only

    Published 2011
    Table of Contents: “…Modal test and analysis of a bridge under the varying temperature condition -- Bridge significant failure mode identification strategy under traffic-load -- Fatigue reliability analysis of the stay cables of cable-stayed bridge under combined loads of stochastic traffic and wind -- Updating the finite element model of a bridge model using a hybrid optimization method -- An improved Taguchi method and its application in finite element model updating of bridges -- Nonlinear seismic response analysis of half through CFST arch bridge under 3-D earthquake waves -- Simplified seismic response assessment method and parametric study of multi-girder skew bridges -- Seismic testing of a long-span concrete filled steel tubular arch bridge -- Study on finite element model of bridge multi-pile foundation -- Sensor optimal placement for bridge structure based on single parents genetic algorithm with different fitness functions.…”
    Full text (MFA users only)
    Electronic eBook
  11. 71
  12. 72

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  13. 73

    Integer and Combinatorial Optimization. by Wolsey, Laurence A.

    Published 2014
    Table of Contents: “…The Ellipsoid Algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  14. 74
  15. 75

    Discriminant Analysis and Clustering.

    Published 1988
    Table of Contents: “…COVER -- COPYRIGHT -- PREFACE -- TABLE OF CONTENTS -- CHAPTER 1 INTRODUCTION -- CHAPTER 2 METHODS -- 2.1 INTRODUCTION -- 2.2 METHODS OF DISCRIMINANT ANALYSIS -- 2.2.1 General Remarks -- 2.2.2 Classical Two-group Linear Discriminant Analysis -- 2.2.3 Classification Into One of Several Populations -- 2.2.4 Heterogeneous Covariance Matrices Case -- 2.2.5 Two-group Classification by Logistic Regression -- 2.2.6 Kernel and Nearest Neighbor Methods -- 2.2.7 Classification Trees -- 2.3 METHODS OF CLUSTER ANALYSIS -- 2.3.1 General Remarks -- 2.3.2 Algorithms -- 2.3.3 Perspective -- CHAPTER 3 THEORY -- 3.1 INTRODUCTION -- 3.2 THEORETICAL ISSUES IN DISCRIMINANT ANALYSIS -- 3.2.1 Introduction -- 3.2.2 The Fisher Linear Discriminant and Some of Its Children -- 3.2.3 Estimating Misclassification Costs -- 3.2.4 Nonparametric Techniques -- 3.3 STATISTICAL THEORY IN CLUSTERING -- 3.3.1 Introduction -- 3.3.2 High Density Clusters -- 3.3.3 Agglomerative Methods for High Density Clusters -- 3.3.4 Single Linkage, the Minimum Spanning Tree and Percolation -- 3.3.5 Mixtures -- 3.3.6 The Number of Clusters: Modes -- 3.3.7 The Number of Clusters: Components -- 3.3.8 Ultrametric and Evolutionary Distances -- CHAPTER 4 SOFTWARE AND ALGORITHM IMPLEMENTATION -- 4.1 INTRODUCTION -- 4.2 DISCRIMINANT ANALYSIS -- 4.2.1 Linear and Quadratic Discriminant Functions -- 4.2.2 Review of Packages -- 4.2.3 Logistic Regression -- 4.2.4 Classification Trees -- 4.3 CLUSTER ANALYSIS -- 4.3.1 Collections of Subroutines and Algorithms -- 4.3.2 Cluster Analysis Packages -- 4.3.3 Simple Cluster Analysis Programs -- 4.4 NEEDS -- CHAPTER 5 CLOSING PERSPECTIVE.…”
    Full text (MFA users only)
    Electronic eBook
  16. 76

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  17. 77

    Fast facts for nurses

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  18. 78

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  19. 79

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  20. 80

    Scala for Machine Learning - Second Edition. by Nicolas, Patrick R.

    Published 2017
    Full text (MFA users only)
    Electronic eBook