Search Results - (((((((kant OR wyatt) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

Search alternatives:

  1. 181

    Applied modelling, numerical simulation, computation and optimization. by De Souza Neto, Eduardo

    Published 2017
    Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Firewall design and analysis by Liu, Alex X.

    Published 2011
    Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  4. 184

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    Digital holography by Picart, Pascal

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Learning Boost C++ libraries : solve practical programming problems using powerful, portable, and expressive libraries from Boost by Mukherjee, Arindam

    Published 2015
    Table of Contents: “…Shared ownership semanticsboost::shared_ptr and std::shared_ptr; Intrusive smart pointers -- boost::intrusive_ptr; shared_array; Managing non-memory resources using smart pointers; Self-test questions; Summary; References; Chapter 4: Working with Strings; Text processing with Boost String Algorithms library; Using Boost String Algorithms; Find algorithms; Case-conversion and trimming algorithms; The replace and erase algorithms; The split and join algorithms; Splitting text using the Boost Tokenizer library; Tokenizing based on separators…”
    Full text (MFA users only)
    Electronic eBook
  8. 188

    Handbook of Modal Logic. by Blackburn, Patrick

    Published 2006
    Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data by Golubyatnikov, V. P. (Vladimir P.)

    Published 2000
    Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Biomedical image understanding : methods and applications

    Published 2014
    Table of Contents: “…Venkatesh -- Benchmarking lymph node metastasis classification for gastric cancer staging / Su Zhang, Chao Li, Shuheng Zhang, Lifang Pang and Huan Zhang -- The use of knowledge in biomedical image analysis / Florence Cloppet -- Active shape model for contour detection of anatomical structure / Huiqi Li and Qing Nie.…”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Enterprise artificial intelligence transformation : a playbook for the next generation of business and technology leaders by Haq, Rashed

    Published 2020
    Table of Contents: “…Types of Uses for Machine Learning -- Types of Machine Learning Algorithms -- Supervised, Unsupervised, and Semisupervised Learning -- Making Data More Useful -- Semantic Reasoning -- Applications of AI -- PART II Artificial Intelligence in the Enterprise -- Chapter 3 AI in E-Commerce and Retail -- Digital Advertising -- Marketing and Customer Acquisition -- Cross-Selling, Up-Selling, and Loyalty -- Business-to-Business Customer Intelligence -- Dynamic Pricing and Supply Chain Optimization -- Digital Assistants and Customer Engagement -- Chapter 4 AI in Financial Services -- Anti-Money Laundering.…”
    Full text (MFA users only)
    Electronic eBook
  13. 193

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Energy Psychology : Explorations at the Interface of Energy, Cognition, Behavior, and Health. by Gallo, Fred P.

    Published 2004
    Table of Contents: “…Manual Muscle Testing and KinesiologyApplied Kinesiology Offshoots; Empirical Research on Manual Muscle Testing; Muscle Testing Proficiency; Integrity and Muscle Testing; Therapy and Diagnosis; Self-Testing; Therapeutic Algorithms vs. Causal Diagnostics; Energy Psychology and Manual Muscle Testing; Abuses of Manual Muscle Testing and Algorithms; Manual Muscle Testing and Intuition; Unwarranted Uses; When We're Stumped; Systemic Manual Muscle Testing.…”
    Full text (MFA users only)
    Electronic eBook
  15. 195
  16. 196

    Prognostics and Health Management of Engineering Systems : an Introduction. by Kim, Nam-Ho

    Published 2016
    Table of Contents: “…2.2.2 When a Degradation Model Is Available (Physics-Based Approaches)2.2.2.1 Problem Definition; 2.2.2.2 Parameter Estimation and Degradation Prediction; 2.2.2.3 Effect of Noise in Data; 2.2.3 When a Degradation Model Is NOT Available (Data-Driven Approaches); 2.2.3.1 Function Evaluation; 2.2.3.2 Overfitting; 2.2.3.3 Prognosis with More Training Data; 2.3 RUL Prediction; 2.3.1 RUL; 2.3.2 Prognostics Metrics; 2.3.2.1 Prognostic Horizon (PH); 2.3.2.2 varvec{ alpha { -- } lambda} Accuracy; 2.3.2.3 (Cumulative) Relative Accuracy (RA, CRA); 2.3.2.4 Convergence; 2.3.2.5 Results with MATLAB Code.…”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Multi-agent machine learning : a reinforcement approach

    Published 2014
    Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Radon Transforms and Tomography. by Quinto, Eric Todd

    Published 2001
    Table of Contents: “…Expository Papers -- Local tomography and related problems -- Tomography problems arising in synthetic aperture radar -- Introduction to local tomography -- Algorithms in ultrasound tomography -- Radon transforms, differential equations, and microlocal analysis -- Supplementary bibliography to A bibliographic survey of the Pompeiu problem -- II. …”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Pervasive Computing in Cognitive Communications Applications. by Ghinea, George

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
    Full text (MFA users only)
    eBook
  20. 200

    Smart intelligent computing and communication technology

    Published 2021
    Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook