Search Results - (((((((kant OR want) OR semantic) OR wind) OR cantor) OR anne) OR blaney) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 35
- Data processing 29
- Machine learning 27
- Data mining 22
- Mathematics 17
- Technological innovations 16
- artificial intelligence 16
- Mathematical models 14
- Python (Computer program language) 13
- Artificial Intelligence 12
- Data Mining 12
- Algorithms 11
- Computer science 10
- Neural networks (Computer science) 10
- algorithms 10
- Machine Learning 9
- Application software 8
- Big data 8
- Development 8
- methods 8
- Automatic control 7
- Computational linguistics 7
- Computer networks 7
- Electric power systems 7
- Pattern recognition systems 7
- Computer algorithms 6
- Computer security 6
- History 6
- Information technology 6
- Management 6
Search alternatives:
-
141
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
142
Mastering D3.js.
Published 2014Table of Contents: “…Updating the datasetFixing the enter and exit transitions; Using the barcode chart; Creating a layout algorithm; The radial layout; Computing the angles; Using the layout; Summary; Chapter 3: Creating Visualizations without SVG; SVG support in the browser market; Visualizations without SVG; Loading and sorting the data; The force layout method; Setting the color and size; Creating a legend; Polyfilling; Feature detection; The canvg example; Using canvas and D3; Creating figures with canvas; Creating shapes; Integrating canvas and D3; Summary; Chapter 4: Creating a Color Picker with D3.…”
Full text (MFA users only)
Electronic eBook -
143
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
144
-
145
Advanced manufacturing and industrial engineering : selected, peer reviewed papers from the 4th International Conference on Advanced Engineering Materials and Technology (AEMT 2014...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
146
Communicating process architectures 2002.
Published 2002Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
Full text (MFA users only)
Electronic eBook -
147
Automata and Computability.
Published 1997Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
Full text (MFA users only)
Electronic eBook -
148
Mathematical morphology and its applications to image and signal processing
Published 2000Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
149
Learning-based local visual representation and indexing
Published 2014Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
Full text (MFA users only)
Electronic eBook -
150
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
151
Bridge health monitoring, maintenance and safety : special topic volume with invited peer reviewed papers only
Published 2011Table of Contents: “…Modal test and analysis of a bridge under the varying temperature condition -- Bridge significant failure mode identification strategy under traffic-load -- Fatigue reliability analysis of the stay cables of cable-stayed bridge under combined loads of stochastic traffic and wind -- Updating the finite element model of a bridge model using a hybrid optimization method -- An improved Taguchi method and its application in finite element model updating of bridges -- Nonlinear seismic response analysis of half through CFST arch bridge under 3-D earthquake waves -- Simplified seismic response assessment method and parametric study of multi-girder skew bridges -- Seismic testing of a long-span concrete filled steel tubular arch bridge -- Study on finite element model of bridge multi-pile foundation -- Sensor optimal placement for bridge structure based on single parents genetic algorithm with different fitness functions.…”
Full text (MFA users only)
Electronic eBook -
152
Pattern discovery in biomolecular data : tools, techniques, and applications
Published 1999Table of Contents: “…Discovering patterns in DNA sequences by the algorithmic significance method / Aleksandar Milosavljevic -- Assembling blocks / Jorja G. …”
Full text (MFA users only)
Electronic eBook -
153
Selected papers from the 11th international symposium on electromagnetics fields in electrical engineering ISEF 2003
Published 2004Table of Contents: “…Finite element modelling of stacked thin regions with non-zero global currentsReliability-based topology optimization for electromagnetic systems; A "quasi-genetic" algorithm for searching the dangerous areas generated by a grounding system; Development of optimizing method using quality engineering and multivariate analysis based on finite element method; An improved fast method for computing capacitance; Power losses analysis in the windings of electromagnetic gear; Finite element analysis of the magnetorheological fluid brake transients; Magnetic stimulation of knee -- mathematical model…”
Full text (MFA users only)
Electronic eBook -
154
-
155
Big Data, IoT, and Machine Learning : Tools and Applications.
Published 2020Table of Contents: “…Chapter 3 Reviews Analysis of Apple Store Applications Using Supervised Machine Learning -- 3.1 Introduction -- 3.2 Literature Review -- 3.2.1 Machine Learning Algorithms -- 3.2.2 Feature Extraction Algorithms -- 3.3 Proposed Methodology -- 3.3.1 Data Collection -- 3.3.2 Feature Extraction -- 3.3.3 Data Analysis and Sentiment Analysis -- Text Processing -- 3.3.4 Text Normalisation -- 3.4 Feature Extraction Algorithm -- 3.4.1 CountVectorizer -- 3.4.2 TfidfVectorizer (TF-IDF) -- 3.5 Supervised ML Classification -- 3.6 Experiment Design -- 3.7 Experimental Results and Analysis…”
Full text (MFA users only)
Electronic eBook -
156
Knowledge discovery for business information systems
Published 2001Table of Contents: “…Problem Description -- 3. The FUP Algorithm for the Insertion Only Case -- 4. The FUP Algorithm for the Deletions Only Case -- 5. …”
Full text (MFA users only)
Electronic eBook -
157
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
158
Research Progress of Magnetic Levitating Bearings and Some Advanced Technology.
Published 2012Table of Contents: “…Magnetic Force Characteristics and Structure of a Novel Radial Hybrid Magnetic BearingMethod of Variable Parameter PID Control Applied for AMB System; Research on Adaptive Feedforward Control Algorithm of Electromagnetic Active Vibration Isolation System; Rotor Eddy Current Losses Analysis on BPMSM Using FEM; Self Adaptive Integral-Type Sliding Mode Control for Supporting Structure of a Magnetic Vertical Axis Wind Turbine; Sensorless Control of IPMSM Using Extended Flux Estimation Method; Sensorless Control of IPMSM Using Modified Current Slope Estimation Method…”
Full text (MFA users only)
Electronic eBook -
159
Tsunamis : causes, characteristics, warnings and protection
Published 2010Table of Contents: “…Model of Hydrogen Sulfide Down-Wind Dispersion""; ""8.4. Model Implementation""; ""8.4.1. …”
Full text (MFA users only)
Electronic eBook -
160
Advanced Artificial Intelligence.
Published 2011Table of Contents: “…Applications of temporal and spatial logic; 4.7.4. Randell algorithm; Exercises; Chapter 5 Case-Based Reasoning; 5.1 Overview; 5.2 Basic Notations; 5.3 Process Model; 5.4 Case Representation; 5.4.1 Semantic Memory Unit; 5.4.2 Memory Network; 5.5 Case Indexing; 5.6 Case Retrieval; 5.7 Similarity Relations in CBR; 5.7.1 Semantic similarity; 5.7.2 Structural similarity; 5.7.3 Goal's features; 5.7.4 Individual similarity; 5.7.5 Similarity assessment; 5.8 Case Reuse; 5.9 Case Retainion; 5.10 Instance-Based Learning.…”
Full text (MFA users only)
Electronic eBook