Search Results - (((((((want OR alter) OR wind) OR semantic) OR cantor) OR anne) OR halted) OR wanting) algorithms.

  1. 141

    Advanced Methods and Technologies for Agent and Multi-Agent Systems. by Edited by

    Published 2013
    Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
    Full text (MFA users only)
    Electronic eBook
  2. 142

    Regression Analysis with Python. by Massaron, Luca, Boschetti, Alberto

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  3. 143

    Mastering D3.js. by Castillo, Pablo Navarro

    Published 2014
    Table of Contents: “…Updating the datasetFixing the enter and exit transitions; Using the barcode chart; Creating a layout algorithm; The radial layout; Computing the angles; Using the layout; Summary; Chapter 3: Creating Visualizations without SVG; SVG support in the browser market; Visualizations without SVG; Loading and sorting the data; The force layout method; Setting the color and size; Creating a legend; Polyfilling; Feature detection; The canvg example; Using canvas and D3; Creating figures with canvas; Creating shapes; Integrating canvas and D3; Summary; Chapter 4: Creating a Color Picker with D3.…”
    Full text (MFA users only)
    Electronic eBook
  4. 144

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Hierarchical Protection for Smart Grids. by Ma, Jing

    Published 2018
    Table of Contents: “…3.3 Local Area Protection for Centralized Renewable Energy3.3.1 Connection Form of a Wind Farm and its Protection Configuration; 3.3.2 Adaptive Distance Protection Scheme for Wind Farm Collector Lines; 3.3.3 Differential Protection Scheme for Wind Farm Outgoing Transmission Line; 3.4 Local Area Protection for Distributed Renewable Energy; 3.4.1 Adaptive Protection Approach for a Distribution Network Containing Distributed Generation; 3.4.2 Islanding Detection Method; 3.5 Summary; References; Chapter 4 Topology Analysis; 4.1 Introduction; 4.2 Topology Analysis for the Inner Substation.…”
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Advanced Analytics with R and Tableau. by Stirrup, Jen

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  7. 147

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  8. 148

    Randomness and complexity : from Leibniz to Chaitin

    Published 2007
    Table of Contents: “…Martin Davis -- The Turing Post Language -- Codes for Turing Post Programs -- The Universal Program -- The Halting Problem -- Other Unsolvable Problems -- Undecidable Statements -- Complexity and Randomness -- Unsolvability of Halting Problem -- An Unsolvable Word Problem -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  9. 149

    Monte Carlo methods and applications : proceedings of the 8th IMACS Seminar on Monte Carlo Methods, August 29-September 2, 2011, Borovets, Bulgaria

    Published 2013
    Table of Contents: “…9.3 General Description of the Coupled Atmosphere Fire Modeling and WRF-Fire9.4 Wind Simulation Approach; 9.5 Conclusion; 10 Wireless Sensor Network Layout; 10.1 Introduction; 10.2 Wireless Sensor Network Layout Problem; 10.3 ACO for WSN Layout Problem; 10.4 Experimental Results; 10.5 Conclusion; 11 A Two-Dimensional Lorentzian Distribution for an Atomic Force Microscopy Simulator; 11.1 Introduction; 11.2 Modeling Oxidation Kinetics; 11.3 Development of the Lorentzian Model; 11.3.1 Algorithm for the Gaussian Model; 11.3.2 Development of the Lorentzian Model; 11.4 Conclusion.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 150

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  11. 151

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  12. 152
  13. 153

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  14. 154

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 155

    Learning-based local visual representation and indexing by Rongrong, Ji, Yao, Hongxun, Gao, Yue, Duan, Ling-Yu, Dai, Qionghai

    Published 2014
    Table of Contents: “…3.4.1 Cross-database Case3.4.2 Incremental Transfer; 3.5 Experiments; 3.5.1 Quantitative results; 3.6 Summary; Chapter 4: Supervised Dictionary Learning via Semantic Embedding ; 4.1 Introduction; 4.2 Semantic Labeling Propagation; 4.2.1 Density Diversity Estimation ; 4.3 Supervised Dictionary Learning; 4.3.1 Generative Modeling ; 4.3.2 Supervised Quantization ; 4.4 Experiments; 4.4.1 Database and Evaluations; 4.4.2 Quantitative Results; 4.5 Summary; Chapter 5: Visual Pattern Mining; 5.1 Introduction; 5.2 Discriminative 3D Pattern Mining; 5.2.1 The Proposed Mining Scheme.…”
    Full text (MFA users only)
    Electronic eBook
  16. 156
  17. 157

    Bridge health monitoring, maintenance and safety : special topic volume with invited peer reviewed papers only

    Published 2011
    Table of Contents: “…Modal test and analysis of a bridge under the varying temperature condition -- Bridge significant failure mode identification strategy under traffic-load -- Fatigue reliability analysis of the stay cables of cable-stayed bridge under combined loads of stochastic traffic and wind -- Updating the finite element model of a bridge model using a hybrid optimization method -- An improved Taguchi method and its application in finite element model updating of bridges -- Nonlinear seismic response analysis of half through CFST arch bridge under 3-D earthquake waves -- Simplified seismic response assessment method and parametric study of multi-girder skew bridges -- Seismic testing of a long-span concrete filled steel tubular arch bridge -- Study on finite element model of bridge multi-pile foundation -- Sensor optimal placement for bridge structure based on single parents genetic algorithm with different fitness functions.…”
    Full text (MFA users only)
    Electronic eBook
  18. 158

    Selected papers from the 11th international symposium on electromagnetics fields in electrical engineering ISEF 2003 by Wiak, S.

    Published 2004
    Table of Contents: “…Finite element modelling of stacked thin regions with non-zero global currentsReliability-based topology optimization for electromagnetic systems; A "quasi-genetic" algorithm for searching the dangerous areas generated by a grounding system; Development of optimizing method using quality engineering and multivariate analysis based on finite element method; An improved fast method for computing capacitance; Power losses analysis in the windings of electromagnetic gear; Finite element analysis of the magnetorheological fluid brake transients; Magnetic stimulation of knee -- mathematical model…”
    Full text (MFA users only)
    Electronic eBook
  19. 159

    Big Data, IoT, and Machine Learning : Tools and Applications. by Agrawal, Rashmi

    Published 2020
    Table of Contents: “…Chapter 3 Reviews Analysis of Apple Store Applications Using Supervised Machine Learning -- 3.1 Introduction -- 3.2 Literature Review -- 3.2.1 Machine Learning Algorithms -- 3.2.2 Feature Extraction Algorithms -- 3.3 Proposed Methodology -- 3.3.1 Data Collection -- 3.3.2 Feature Extraction -- 3.3.3 Data Analysis and Sentiment Analysis -- Text Processing -- 3.3.4 Text Normalisation -- 3.4 Feature Extraction Algorithm -- 3.4.1 CountVectorizer -- 3.4.2 TfidfVectorizer (TF-IDF) -- 3.5 Supervised ML Classification -- 3.6 Experiment Design -- 3.7 Experimental Results and Analysis…”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Mastering Scala machine learning by Kozlov, Alexander

    Published 2016
    Full text (MFA users only)
    Electronic eBook