Search Results - (((((((kant OR wanting) OR semantic) OR kind) OR cantor) OR anne) OR planet) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 39
- Data processing 34
- Machine learning 29
- Data mining 23
- Mathematics 21
- Mathematical models 19
- artificial intelligence 18
- Algorithms 17
- algorithms 15
- Artificial Intelligence 13
- Computer science 13
- Data Mining 13
- Neural networks (Computer science) 13
- Python (Computer program language) 13
- Technological innovations 12
- Computer networks 11
- Electronic data processing 10
- Information technology 10
- Social aspects 10
- methods 10
- Computer algorithms 9
- Machine Learning 9
- Application software 8
- Big data 8
- Computational linguistics 8
- Computer security 8
- Computer simulation 8
- Development 8
- Neural Networks, Computer 8
- Pattern recognition systems 8
Search alternatives:
- kant »
- wanting »
- kind »
-
121
-
122
-
123
Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium
Published 2006Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
Full text (MFA users only)
Electronic eBook -
124
Inverse problems of electromagnetic geophysical fields
Published 1999Table of Contents: “…Reducing the direct problem to the integral equation of the second kind…”
Full text (MFA users only)
Electronic eBook -
125
Genetic Fuzzy Systems : Evolutionary Tuning and Learning of Fuzzy Knowledge Bases.
Published 2001Table of Contents: “…Foreword; Preface; Contents; Chapter 1 Fuzzy Rule-Based Systems; 1.1 Framework: Fuzzy Logic and Fuzzy Systems; 1.2 Mamdani Fuzzy Rule-Based Systems; 1.3 Takagi-Sugeno-Kang Fuzzy Rule-Based Systems; 1.4 Generation of the Fuzzy Rule Set; 1.5 Applying Fuzzy Rule-Based Systems; Chapter 2 Evolutionary Computation; 2.1 Conceptual Foundations of Evolutionary Computation; 2.2 Genetic Algorithms; 2.3 Other Evolutionary Algorithms; Chapter 3 Introduction to Genetic Fuzzy Systems; 3.1 Soft Computing; 3.2 Hybridisation in Soft Computing; 3.3 Integration of Evolutionary Algorithms and Fuzzy Logic…”
Full text (MFA users only)
Electronic eBook -
126
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
127
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
128
Biomedical image analysis recipes in MATLAB : for life scientists and engineers
Published 2015Full text (MFA users only)
Electronic eBook -
129
Learning Boost C++ libraries : solve practical programming problems using powerful, portable, and expressive libraries from Boost
Published 2015Table of Contents: “…Shared ownership semanticsboost::shared_ptr and std::shared_ptr; Intrusive smart pointers -- boost::intrusive_ptr; shared_array; Managing non-memory resources using smart pointers; Self-test questions; Summary; References; Chapter 4: Working with Strings; Text processing with Boost String Algorithms library; Using Boost String Algorithms; Find algorithms; Case-conversion and trimming algorithms; The replace and erase algorithms; The split and join algorithms; Splitting text using the Boost Tokenizer library; Tokenizing based on separators…”
Full text (MFA users only)
Electronic eBook -
130
Handbook of Modal Logic.
Published 2006Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
Full text (MFA users only)
Electronic eBook -
131
Enterprise artificial intelligence transformation : a playbook for the next generation of business and technology leaders
Published 2020Table of Contents: “…Types of Uses for Machine Learning -- Types of Machine Learning Algorithms -- Supervised, Unsupervised, and Semisupervised Learning -- Making Data More Useful -- Semantic Reasoning -- Applications of AI -- PART II Artificial Intelligence in the Enterprise -- Chapter 3 AI in E-Commerce and Retail -- Digital Advertising -- Marketing and Customer Acquisition -- Cross-Selling, Up-Selling, and Loyalty -- Business-to-Business Customer Intelligence -- Dynamic Pricing and Supply Chain Optimization -- Digital Assistants and Customer Engagement -- Chapter 4 AI in Financial Services -- Anti-Money Laundering.…”
Full text (MFA users only)
Electronic eBook -
132
Battery management systems. Volume I, Battery modeling
Published 2015Full text (MFA users only)
Electronic eBook -
133
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
134
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
135
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
136
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
137
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
138
Compressed sensing : theory and applications
Published 2012Full text (MFA users only)
Electronic eBook -
139
Atlas of AI : power, politics, and the planetary costs of artificial intelligence
Published 2021Full text (MFA users only)
Electronic eBook -
140
Theory of linear ill-posed problems and its applications
Published 2002Table of Contents: “…Basic techniques for constructing regularizing algorithms -- 3.1. Reduction to operator equations of the second kind -- 3.2. …”
Full text (MFA users only)
Electronic eBook