Search Results - (((((((kent OR jantii) OR semantic) OR wind) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 39
- Data processing 37
- Mathematics 34
- Mathematical models 26
- Technological innovations 20
- Machine learning 17
- artificial intelligence 17
- Data mining 15
- Algorithms 14
- Mathematical optimization 13
- Artificial Intelligence 12
- Computer science 12
- Manufacturing processes 12
- History 11
- Image processing 11
- algorithms 11
- Digital techniques 10
- Engineering 10
- Social aspects 10
- Big data 9
- Computer networks 9
- Information technology 9
- Mechanical engineering 9
- Electric power systems 8
- Neural networks (Computer science) 8
- Pattern recognition systems 8
- Research 8
- Automation 7
- Computational linguistics 7
- Computer graphics 7
Search alternatives:
- kent »
-
161
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
162
-
163
Learning Boost C++ libraries : solve practical programming problems using powerful, portable, and expressive libraries from Boost
Published 2015Table of Contents: “…Shared ownership semanticsboost::shared_ptr and std::shared_ptr; Intrusive smart pointers -- boost::intrusive_ptr; shared_array; Managing non-memory resources using smart pointers; Self-test questions; Summary; References; Chapter 4: Working with Strings; Text processing with Boost String Algorithms library; Using Boost String Algorithms; Find algorithms; Case-conversion and trimming algorithms; The replace and erase algorithms; The split and join algorithms; Splitting text using the Boost Tokenizer library; Tokenizing based on separators…”
Full text (MFA users only)
Electronic eBook -
164
Handbook of Modal Logic.
Published 2006Table of Contents: “…13 Quantified Modal Logic13.1 Syntax and Semantics; 13.2 Constant Domain Tableaus; 13.3 Soundness and Completeness; 13.4 Variations; 14 Conclusion; Bibliography; Chapter 3 Complexity of Modal Logic; 1 Introduction; 1.1 Examples of decision problems in modal logic; 1.2 A simple and a hard problem; 1.3 The model checking problem; 1.4 The consequence problem; 1.5 A tiling logic; 2 Decision algorithms; 2.1 Selection of points; 2.2 Filtration; 2.3 Hintikka set elimination; 2.4 Hintikka set elimination without constraints; 2.5 Forcing exponentially deep paths; 2.6 Tree automata; 2.7 Pseudo-models.…”
Full text (MFA users only)
Electronic eBook -
165
Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data
Published 2000Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
Full text (MFA users only)
Electronic eBook -
166
Stochastic Models in Reliability Engineering.
Published 2020Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
Full text (MFA users only)
Electronic eBook -
167
Biomedical image understanding : methods and applications
Published 2014Table of Contents: “…Venkatesh -- Benchmarking lymph node metastasis classification for gastric cancer staging / Su Zhang, Chao Li, Shuheng Zhang, Lifang Pang and Huan Zhang -- The use of knowledge in biomedical image analysis / Florence Cloppet -- Active shape model for contour detection of anatomical structure / Huiqi Li and Qing Nie.…”
Full text (MFA users only)
Electronic eBook -
168
Enterprise artificial intelligence transformation : a playbook for the next generation of business and technology leaders
Published 2020Table of Contents: “…Types of Uses for Machine Learning -- Types of Machine Learning Algorithms -- Supervised, Unsupervised, and Semisupervised Learning -- Making Data More Useful -- Semantic Reasoning -- Applications of AI -- PART II Artificial Intelligence in the Enterprise -- Chapter 3 AI in E-Commerce and Retail -- Digital Advertising -- Marketing and Customer Acquisition -- Cross-Selling, Up-Selling, and Loyalty -- Business-to-Business Customer Intelligence -- Dynamic Pricing and Supply Chain Optimization -- Digital Assistants and Customer Engagement -- Chapter 4 AI in Financial Services -- Anti-Money Laundering.…”
Full text (MFA users only)
Electronic eBook -
169
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
170
Advanced composites for marine engineering : selected, peer reviewed papers from the 1st International Conference on Advanced Composites for Marine Engineering (ICACME 2013), Septe...
Published 2015Table of Contents: “…Advanced Composites for Marine Engineering; Preface; Table of Contents; Chapter 1: Numerical Methods and Analysis, Optimization, Algorithm and Modelling for Materials and Structures; An Efficient Analytical Failure Analysis Approach for Multilayered Composite Offshore Production Risers; Composite Wind Turbine Blade Aerodynamic and Structural Integrated Design Optimization Based on RBF Meta-Model; Rapid Predicting the Impact Behaviors of Marine Composite Laminates; Study on the Factors of Residual Thermal Stress on Single Lap Joint.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
171
Advanced Control and Optimization Paradigms for Energy System Operation and Management.
Published 2023Table of Contents: “…3.4: Procedure -- 3.4.1: Solar Photovoltaic System -- 3.4.2: Wind Turbine -- 3.4.3: Battery Energy Storage System -- 3.4.4: Diesel Generator -- 3.5: Modelling of the HRES with Different kinds of Batteries -- 3.6: System Metrics -- 3.6.1: Economic Metrics -- 3.6.2: Technical Performance of the Overall System -- 3.6.3: Contribution of Solar PV -- 3.6.4: Contribution of Wind Turbine and Diesel Generator -- 3.6.5: Technical Specification of Different Batteries Used in HRES -- 3.7: State of Charge of Battery -- 3.8: Emissions through a Different System with Different Batteries -- 3.9: Conclusions…”
Full text (MFA users only)
Electronic eBook -
172
Language and logos : studies in theoretical and computational linguistics
Published 2010Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
Full text (MFA users only)
Electronic eBook -
173
Multi-agent machine learning : a reinforcement approach
Published 2014Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
Full text (MFA users only)
Electronic eBook -
174
Pervasive Computing in Cognitive Communications Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
Full text (MFA users only)
eBook -
175
Maritime engineering and technology : proceedings of MARTECH 2011, 1st International Conference on Maritime Technology and Engineering, Lisbon, Portugal, 10-12 May 2011
Published 2012Table of Contents: “…Considering disabled people in sailing yacht designHull shape design of a compressed natural gas ship; Short sea shipping route and stowage plan optimization; Non-linear optimization applied to preliminary ship design; Planning a fleet of containerships for a given set of ports; Design development of an oil and garbage collector and boom layer vessel; Generation of an adaptive triangular mesh from a parametric surface; Ship propulsion & control; Controllable pitch propeller control with neural network algorithm.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
176
Smart intelligent computing and communication technology
Published 2021Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
177
Reconstructing evolution : new mathematical and computational advances
Published 2007Full text (MFA users only)
Electronic eBook -
178
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
179
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
180
Numerical methods for viscosity solutions and applications
Published 2001Full text (MFA users only)
Electronic eBook