Search Results - (((((((anti OR wpbanting) OR span) OR dantis) OR cantor) OR anne) OR carter) OR anting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 22
- Mathematics 18
- Mathematical optimization 17
- Data processing 16
- Mathematical models 14
- artificial intelligence 12
- Diseases 9
- Technological innovations 9
- Algorithms 8
- Neural networks (Computer science) 8
- Artificial Intelligence 7
- Computer networks 7
- Data mining 7
- Information technology 7
- Machine learning 7
- algorithms 7
- methods 7
- Computer simulation 6
- Design and construction 6
- Social aspects 6
- Bioinformatics 5
- Computational biology 5
- Electric power systems 5
- Graph theory 5
- Manufacturing processes 5
- Materials 5
- Research 5
- Swarm intelligence 5
- diagnosis 5
- Automatic control 4
Search alternatives:
- wpbanting »
- span »
- dantis »
- anting »
-
81
Bridge health monitoring, maintenance and safety : special topic volume with invited peer reviewed papers only
Published 2011Table of Contents: “…Modal test and analysis of a bridge under the varying temperature condition -- Bridge significant failure mode identification strategy under traffic-load -- Fatigue reliability analysis of the stay cables of cable-stayed bridge under combined loads of stochastic traffic and wind -- Updating the finite element model of a bridge model using a hybrid optimization method -- An improved Taguchi method and its application in finite element model updating of bridges -- Nonlinear seismic response analysis of half through CFST arch bridge under 3-D earthquake waves -- Simplified seismic response assessment method and parametric study of multi-girder skew bridges -- Seismic testing of a long-span concrete filled steel tubular arch bridge -- Study on finite element model of bridge multi-pile foundation -- Sensor optimal placement for bridge structure based on single parents genetic algorithm with different fitness functions.…”
Full text (MFA users only)
Electronic eBook -
82
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
83
Integer and Combinatorial Optimization.
Published 2014Table of Contents: “…The Ellipsoid Algorithm.…”
Full text (MFA users only)
Electronic eBook -
84
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
85
Discriminant Analysis and Clustering.
Published 1988Table of Contents: “…COVER -- COPYRIGHT -- PREFACE -- TABLE OF CONTENTS -- CHAPTER 1 INTRODUCTION -- CHAPTER 2 METHODS -- 2.1 INTRODUCTION -- 2.2 METHODS OF DISCRIMINANT ANALYSIS -- 2.2.1 General Remarks -- 2.2.2 Classical Two-group Linear Discriminant Analysis -- 2.2.3 Classification Into One of Several Populations -- 2.2.4 Heterogeneous Covariance Matrices Case -- 2.2.5 Two-group Classification by Logistic Regression -- 2.2.6 Kernel and Nearest Neighbor Methods -- 2.2.7 Classification Trees -- 2.3 METHODS OF CLUSTER ANALYSIS -- 2.3.1 General Remarks -- 2.3.2 Algorithms -- 2.3.3 Perspective -- CHAPTER 3 THEORY -- 3.1 INTRODUCTION -- 3.2 THEORETICAL ISSUES IN DISCRIMINANT ANALYSIS -- 3.2.1 Introduction -- 3.2.2 The Fisher Linear Discriminant and Some of Its Children -- 3.2.3 Estimating Misclassification Costs -- 3.2.4 Nonparametric Techniques -- 3.3 STATISTICAL THEORY IN CLUSTERING -- 3.3.1 Introduction -- 3.3.2 High Density Clusters -- 3.3.3 Agglomerative Methods for High Density Clusters -- 3.3.4 Single Linkage, the Minimum Spanning Tree and Percolation -- 3.3.5 Mixtures -- 3.3.6 The Number of Clusters: Modes -- 3.3.7 The Number of Clusters: Components -- 3.3.8 Ultrametric and Evolutionary Distances -- CHAPTER 4 SOFTWARE AND ALGORITHM IMPLEMENTATION -- 4.1 INTRODUCTION -- 4.2 DISCRIMINANT ANALYSIS -- 4.2.1 Linear and Quadratic Discriminant Functions -- 4.2.2 Review of Packages -- 4.2.3 Logistic Regression -- 4.2.4 Classification Trees -- 4.3 CLUSTER ANALYSIS -- 4.3.1 Collections of Subroutines and Algorithms -- 4.3.2 Cluster Analysis Packages -- 4.3.3 Simple Cluster Analysis Programs -- 4.4 NEEDS -- CHAPTER 5 CLOSING PERSPECTIVE.…”
Full text (MFA users only)
Electronic eBook -
86
Bio-inspired computation in telecommunications
Published 2015Table of Contents: “…Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. …”
Full text (MFA users only)
Electronic eBook -
87
Optimization of Logistics.
Published 2012Table of Contents: “…2.4.1. Genetic algorithms2.4.2. Ant colonies; 2.4.3. Tabu search; 2.4.4. …”
Full text (MFA users only)
Electronic eBook -
88
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
89
-
90
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
91
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
92
Metaheuristics for intelligent electrical networks
Published 2017Table of Contents: “…2.2.1. Genetic algorithms2.2.2. Evolution strategies; 2.2.3. Coevolutionary algorithms; 2.2.4. …”
Full text (MFA users only)
Electronic eBook -
93
Advances in nonlinear waves and symbolic computation
Published 2009Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
Full text (MFA users only)
Electronic eBook -
94
Discrete Mathematics for Computer Science : An Example-Based Introduction.
Published 2021Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Algorithms -- 1.1. WHAT ARE ALGORITHMS? -- 1.2. CONTROL STRUCTURES -- 1.3. …”
Full text (MFA users only)
Electronic eBook -
95
Computational Systems Bioinformatics - Proceedings Of The Conference Csb 2006.
Published 2006Full text (MFA users only)
Electronic eBook -
96
OIPE 2012
Published 2014Table of Contents: “…N-level output space mapping for electromagnetic design optimizationHigh-speed functionality optimization of five-phase PM machine using third harmonic current; Topology optimization of magnetostatic shielding using multistep evolutionary algorithms with additional searches in a restricted design space ; Adaptive unscented transform for uncertainty quantification in EMC large-scale systems; Ant colony optimization for the topological design of interior permanent magnet (IPM)machines; Multiobjective approach developed for optimizing the dynamic behavior of incremental linear actuators.…”
Full text (MFA users only)
Electronic eBook -
97
Twitter and tear gas : the power and fragility of networked protest
Published 2017Full text (MFA users only)
Electronic eBook -
98
Communication System Security.
Published 2012Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
Full text (MFA users only)
Electronic eBook -
99
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
100
Continuing Kepler's Quest : Assessing Air Force Space Command's Astrodynamics Standards
Published 2012Full text (MFA users only)
Electronic eBook