Search Results - (((((((kant OR canton) OR semantic) OR king) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 37
- Data processing 32
- Mathematics 22
- Machine learning 19
- Data mining 17
- Technological innovations 17
- Algorithms 16
- artificial intelligence 16
- Mathematical models 15
- Computer science 14
- algorithms 14
- Management 13
- Big data 12
- Information technology 12
- Computer networks 11
- Computer algorithms 10
- Artificial Intelligence 9
- Computational linguistics 8
- Neural networks (Computer science) 8
- Social aspects 8
- Data Mining 7
- Logic, Symbolic and mathematical 7
- Research 7
- Automatic control 6
- Computer security 6
- Data encryption (Computer science) 6
- Development 6
- Economic aspects 6
- History 6
- Natural language processing (Computer science) 6
Search alternatives:
-
141
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
142
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
143
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
144
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
145
Big Data and HPC.
Published 2018Table of Contents: “…Analysis and Design of IoT Based Physical Location Monitoring SystemAutonomous Task Scheduling for Fast Big Data Processing; Adaptive Resource Management for Distributed Data Analytics; HPC Challenges; High-Performance Massive Subgraph Counting Using Pipelined Adaptive-Group Communication; Final Parallel and Distributed Computing Assignment for Master Students: Description of the Properties and Parallel Structure of Algorithms; Parallel Motion Estimation Based on GPU and Combined GPU-CPU; GPU-Based Iterative Hill Climbing Algorithm to Solve Symmetric Traveling Salesman Problem.…”
Full text (MFA users only)
Electronic eBook -
146
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
147
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
148
Informatics and technology in clinical care and public health
Published 2022Table of Contents: “…Intro -- Title Page -- Preface -- ICIMTH 2021 Scientific Programme Committee and Reviewers -- Contents -- Using Artificial Intelligence to Develop a Lexicon-Based African American Tweet Detection Algorithm to Inform Culturally Sensitive Twitter-Based Social Support Interventions for African American Dementia Caregivers -- A Comparison of Word Embeddings to Study Complications in Neurosurgery -- Gulf Cooperation Council Clinical Trials in the Pursuit of Medications for COVID-19…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
149
Hippocrates cried : the decline of American psychiatry
Published 2013Full text (MFA users only)
Electronic eBook -
150
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
151
Automata and Computability.
Published 1997Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
Full text (MFA users only)
Electronic eBook -
152
Hands-On Blockchain with Hyperledger : Building Decentralized Applications with Hyperledger Fabric and Composer.
Published 2018Table of Contents: “…Decentralization with systemic governanceEnterprise support; Use case-driven pluggability choices; Shared ledger technology; Consensus; Crypto algorithms and encryption technology; Use case-driven pluggable choices; Enterprise integration and designing for extensibility; Other considerations; Consensus, ACID property, and CAP; CAP; ACID; Attestation -- SSCs are signed and encrypted; Use of HSMs; Summary; Chapter 2: Exploring Hyperledger Fabric; Building on the foundations of open computing; Fundamentals of the Hyperledger project; The Linux Foundation ; Hyperledger.…”
Full text (MFA users only)
Electronic eBook -
153
Mathematical morphology and its applications to image and signal processing
Published 2000Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
154
Learning-based local visual representation and indexing
Published 2014Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
Full text (MFA users only)
Electronic eBook -
155
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
156
Robot Intelligence for Coordinated Manipulation and Its Industrial Application.
Published 2020Table of Contents: “…Cover -- Guest editorial -- A conceptual scale model of mobile drilling robot -- Dynamic characteristics of a jumping robot with coordinated quadruped legs -- Identification of nonlinear state-space time-delay system -- An end-to-end learning method for industrial defect detection -- One-shot gesture recognition with attention based DTW for human-robot collaboration -- Wirerope-driven exoskeleton to assist lower-limb rehabilitation of hemiplegic patients by using motion capture -- Effective anti-collision algorithms for RFID robots system…”
Full text (MFA users only)
eBook -
157
Big Data, IoT, and Machine Learning : Tools and Applications.
Published 2020Table of Contents: “…Chapter 3 Reviews Analysis of Apple Store Applications Using Supervised Machine Learning -- 3.1 Introduction -- 3.2 Literature Review -- 3.2.1 Machine Learning Algorithms -- 3.2.2 Feature Extraction Algorithms -- 3.3 Proposed Methodology -- 3.3.1 Data Collection -- 3.3.2 Feature Extraction -- 3.3.3 Data Analysis and Sentiment Analysis -- Text Processing -- 3.3.4 Text Normalisation -- 3.4 Feature Extraction Algorithm -- 3.4.1 CountVectorizer -- 3.4.2 TfidfVectorizer (TF-IDF) -- 3.5 Supervised ML Classification -- 3.6 Experiment Design -- 3.7 Experimental Results and Analysis…”
Full text (MFA users only)
Electronic eBook -
158
Knowledge discovery for business information systems
Published 2001Table of Contents: “…Problem Description -- 3. The FUP Algorithm for the Insertion Only Case -- 4. The FUP Algorithm for the Deletions Only Case -- 5. …”
Full text (MFA users only)
Electronic eBook -
159
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
160
Making tough decisions well and badly : framing, deciding, implementing, assessing
Published 2016Full text (MFA users only)
Electronic eBook