Search Results - (((((((kant OR kwants) OR santis) OR markant) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 26
- Mathematics 25
- Artificial intelligence 22
- Mathematical models 19
- Algorithms 13
- Machine learning 13
- Technological innovations 12
- artificial intelligence 12
- Mathematical optimization 11
- Digital techniques 10
- Image processing 10
- algorithms 10
- History 9
- Social aspects 9
- Artificial Intelligence 8
- Neural networks (Computer science) 8
- Computer graphics 7
- Computer networks 7
- Engineering 7
- Data mining 6
- Information technology 6
- Manufacturing processes 6
- Mechanical engineering 6
- computer graphics 6
- digital imaging 6
- Automation 5
- Computer algorithms 5
- Computer vision 5
- Computer-aided design 5
- Finite element method 5
Search alternatives:
-
81
The NURBS Book
Published 1997Table of Contents: “…One Curve and Surface Basics -- 1.1 Implicit and Parametric Forms -- 1.2 Power Basis Form of a Curve -- 1.3 Bézier Curves -- 1.4 Rational Bézier Curves -- 1.5 Tensor Product Surfaces -- Exercises -- Two B-Spline Basis Functions -- 2.1 Introduction -- 2.2 Definition and Properties of B-spline Basis Functions -- 2.3 Derivatives of B-spline Basis Functions -- 2.4 Further Properties of the Basis Functions -- 2.5 Computational Algorithms -- Exercises -- Three B-spline Curves and Surfaces -- 3.1 Introduction -- 3.2 The Definition and Properties of B-spline Curves -- 3.3 The Derivatives of a B-spline Curve -- 3.4 Definition and Properties of B-spline Surfaces -- 3.5 Derivatives of a B-spline Surface -- Exercises -- Four Rational B-spline Curves and Surfaces -- 4.1 Introduction -- 4.2 Definition and Properties of NURBS Curves -- 4.3 Derivatives of a NURBS Curve -- 4.4 Definition and Properties of NURBS Surfaces -- 4.5 Derivatives of a NURBS Surface -- Exercises -- Five Fundamental Geometric Algorithms -- 5.1 Introduction -- 5.2 Knot Insertion -- 5.3 Knot Refinement -- 5.4 Knot Removal -- 5.5 Degree Elevation -- 5.6 Degree Reduction -- Exercises -- Six Advanced Geometric Algorithms -- 6.1 Point Inversion and Projection for Curves and Surfaces -- 6.2 Surface Tangent Vector Inversion -- 6.3 Transformations and Projections of Curves and Surfaces -- 6.4 Reparameterization of NURBS Curves and Surfaces -- 6.5 Curve and Surface Reversal -- 6.6 Conversion Between B-spline and Piecewise Power Basis Forms -- Exercises -- Seven Conics and Circles -- 7.1 Introduction -- 7.2 Various Forms for Representing Conics -- 7.3 The Quadratic Rational Bézier Arc -- 7.4 Infinite Control Points -- 7.5 Construction of Circles -- 7.6 Construction of Conies -- 7.7 Conic Type Classification and Form Conversion -- 7.8 Higher Order Circles -- Exercises -- Eight Construction of Common Surfaces -- 8.1 Introduction -- 8.2 Bilinear Surfaces -- 8.3 The General Cylinder -- 8.4 The Ruled Surface -- 8.5 The Surface of Revolution -- 8.6 Nonuniform Scaling of Surfaces -- 8.7 A Three-sided Spherical Surface -- Nine Curve and Surface Fitting -- 9.1 Introduction -- 9.2 Global Interpolation -- 9.3 Local Interpolation -- 9.4 Global Approximation -- 9.5 Local Approximation -- Exercises -- Ten Advanced Surface Construction Techniques -- 10.1 Introduction -- 10.2 Swung Surfaces -- 10.3 Skinned Surfaces -- 10.4 Swept Surfaces -- 10.5 Interpolation of a Bidirectional Curve Network -- 10.6 Coons Surfaces -- Eleven Shape Modification Tools -- 11.1 Introduction -- 11.2 Control Point Repositioning -- 11.3 Weight Modification -- 11.4 Shape Operators -- 11.5 Constraint-based Curve and Surface Shaping -- Twelve Standards and Data Exchange -- 12.1 Introduction -- 12.2 Knot Vectors -- 12.3 Nurbs Within the Standards -- 12.4 Data Exchange to and from a NURBS System -- Thirteen B-spline Programming Concepts -- 13.1 Introduction -- 13.2 Data Types and Portability -- 13.3 Data Structures -- 13.4 Memory Allocation -- 13.5 Error Control -- 13.6 Utility Routines -- 13.7 Arithmetic Routines -- 13.8 Example Programs -- 13.9 Additional Structures -- 13.10 System Structure -- References.…”
Full text (MFA users only)
Electronic eBook -
82
-
83
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
84
-
85
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
86
Applied modelling, numerical simulation, computation and optimization.
Published 2017Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
Full text (MFA users only)
Electronic eBook -
87
Firewall design and analysis
Published 2011Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
Full text (MFA users only)
Electronic eBook -
88
Ivor Horton's beginning Visual C++ 2012
Published 2012Table of Contents: “…Algorithms --…”
Full text (MFA users only)
Electronic eBook -
89
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
90
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
91
-
92
Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data
Published 2000Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
Full text (MFA users only)
Electronic eBook -
93
Stochastic Models in Reliability Engineering.
Published 2020Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
Full text (MFA users only)
Electronic eBook -
94
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
95
Multi-agent machine learning : a reinforcement approach
Published 2014Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
Full text (MFA users only)
Electronic eBook -
96
Radon Transforms and Tomography.
Published 2001Table of Contents: “…Expository Papers -- Local tomography and related problems -- Tomography problems arising in synthetic aperture radar -- Introduction to local tomography -- Algorithms in ultrasound tomography -- Radon transforms, differential equations, and microlocal analysis -- Supplementary bibliography to A bibliographic survey of the Pompeiu problem -- II. …”
Full text (MFA users only)
Electronic eBook -
97
Pervasive Computing in Cognitive Communications Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
Full text (MFA users only)
eBook -
98
Smart intelligent computing and communication technology
Published 2021Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
99
Reconstructing evolution : new mathematical and computational advances
Published 2007Full text (MFA users only)
Electronic eBook -
100
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook