Search Results - (((((((anti OR wyant) OR semantic) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 36
- Data processing 29
- Mathematics 23
- Mathematical models 20
- Technological innovations 19
- Machine learning 18
- Data mining 17
- Algorithms 16
- artificial intelligence 15
- Computer science 14
- algorithms 14
- Management 13
- Computer networks 12
- Big data 11
- Information technology 11
- Computer algorithms 10
- Artificial Intelligence 9
- Diseases 9
- Social aspects 9
- methods 9
- Automatic control 8
- Computational linguistics 8
- Materials 8
- Neural networks (Computer science) 8
- Research 8
- Computer security 7
- Data Mining 7
- Development 7
- Logic, Symbolic and mathematical 7
- Political aspects 7
Search alternatives:
- wyant »
- wien »
- share »
-
121
What Every Teacher Should Know About Effective Teaching Strategies.
Published 1900Table of Contents: “…-- Why the Way We Teach is Important -- The Linguistic Modality -- The Nonlinguistic Modality -- The Affective Modality -- Semantic Memory -- Episodic Memory -- Procedural Memory -- Automatic Memory -- Emotional Memory -- Chapter 2 -- Choosing Effective Teaching Strategies for Beginning Activities -- Great Beginnings -- The Self-System…”
Full text (MFA users only)
Electronic eBook -
122
New autonomous systems
Published 2016Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
Full text (MFA users only)
Electronic eBook -
123
3D Shape Analysis : Fundamentals, Theory and Applications.
Published 2018Table of Contents: “…7.2 Problem Formulation7.3 Mathematical Tools; 7.4 Isometric Correspondence and Registration; 7.5 Nonisometric (Elastic) Correspondence and Registration; 7.6 Summary and Further Reading; 8 Semantic Correspondences; 8.1 Introduction; 8.2 Mathematical Formulation; 8.3 Graph Representation; 8.4 Energy Functions for Semantic Labeling; 8.5 Semantic Labeling; 8.6 Examples; 8.7 Summary and Further Reading; Part IV: Applications; 9 Examples of 3D Semantic Applications; 9.1 Introduction; 9.2 Semantics: Shape or Status; 9.3 Semantics: Class or Identity; 9.4 Semantics: Behavior; 9.5 Semantics: Position…”
Full text (MFA users only)
Electronic eBook -
124
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
125
Cybernetic Intelligence
Published 2005Table of Contents: “…Editorial advisory board; Preface; Editorial; Second-order cybernetics and enactive perception; Semantic category theory cognition and conceptual reference; Bipolar logic and probabilistic interpretation; Cooperative clans; Future reasoning machines: mind and body; Machine vision methods for autonomous micro-robotic systems; Optimisation enhancement using self-organising fuzzy control; Intelligent agents and distributed models for cooperative task support; Landscape classification and problem specific reasoning for genetic algorithms; Business cybernetics: a provocative suggestion.…”
Full text (MFA users only)
Electronic eBook -
126
Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals
Published 2022Table of Contents: “…Expertise, Authority and Credibility -- Experts -- Sharing information -- Evaluating information -- Authority -- How can authority be evaluated? …”
Full text (MFA users only)
Electronic eBook -
127
Language engineering for lesser-studied languages
Published 2009Table of Contents: “…Derzhanski -- Computational morphology for lesser-studied languages / Kemal Olfazer -- Practical syntastic processing of flexible word order languages with dynamic syntax / David Tugwell -- Computation field semantics : acquiring an ontological-semantic lexicon for a new language / Sergei Nirenburg and Marjorie McShane -- Applying machine translation for low- and middle-density languages / Stella Markantonatou [and others] -- Language resources for semitic languages : challenges and solutions / Shuly Wintner -- Low-density language strategies for Persian and Armenian / Karine Megerdoomian.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
128
Theory of information : fundamentality, diversity and unification
Published 2010Table of Contents: “…Algorithmic information theory based on recursive algorithms : recursive approach. 5.3. …”
Full text (MFA users only)
Electronic eBook -
129
Artificial Intelligence in Semiconductor Industry - Materials to Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
Full text (MFA users only)
Electronic eBook -
130
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
131
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
132
Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium
Published 2006Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
Full text (MFA users only)
Electronic eBook -
133
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
134
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
135
Blockchain-based peer-to-peer transactions in energy systems
Published 2023Table of Contents: “…Smart contract-based peer-to-peer energy storage-sharing architecture and algorithm -- 8.3. Smart contract functions for the storage-sharing scheme -- 8.4. …”
Full text (MFA users only)
Electronic eBook -
136
Multi-label dimensionality reduction
Published 2014Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
Full text (MFA users only)
Electronic eBook -
137
Handbook of Modal Logic.
Published 2006Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
Full text (MFA users only)
Electronic eBook -
138
Elements of quantum computation and quantum communication
Published 2013Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
Full text (MFA users only)
Electronic eBook -
139
Advances in nonlinear waves and symbolic computation
Published 2009Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
Full text (MFA users only)
Electronic eBook -
140