Search Results - (((((((want OR alter) OR wind) OR semantic) OR cantor) OR anne) OR halted) OR wwanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 35
- Data processing 27
- Machine learning 25
- Data mining 22
- Mathematics 17
- artificial intelligence 16
- Technological innovations 15
- Mathematical models 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Data Mining 12
- methods 11
- Computer science 10
- Neural networks (Computer science) 10
- Machine Learning 9
- Application software 8
- Big data 8
- Development 8
- Automatic control 7
- Computational linguistics 7
- Electric power systems 7
- Management 7
- Algorithms 6
- Computer networks 6
- Computer security 6
- Information technology 6
- Manufacturing processes 6
- Pattern recognition systems 6
- Social aspects 6
- algorithms 6
Search alternatives:
-
241
Maritime engineering and technology : proceedings of MARTECH 2011, 1st International Conference on Maritime Technology and Engineering, Lisbon, Portugal, 10-12 May 2011
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
242
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
243
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
244
Sensors, mechatronics and automation : selected, peer reviewed papers from the 2013 International Conference on Sensors, Mechatronics and Automation (ICSMA 2013), December 24-25, 2...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
245
Automatic control and mechatronic engineering III : selected, peer reviewed papers from the 3rd International Conference on Automatic Control and Mechatronic Engineering (ICACME 20...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
246
Topics On Mathematics For Smart Systems : Proceedings of the European Conference.
Published 2007Full text (MFA users only)
Electronic eBook -
247
Engineering solutions for manufacturing processes IV : selected, peer reviewed papers from the 2013 4th International Conference on Advances in Materials and Manufacturing (ICAMMP...
Published 2014Table of Contents: “…Multi-Objective Optimization of the FOFAS Based on the Workbench/ExplorationThe Optimization Design of Wind Turbine Gearbox Based on Improved Genetic Algorithm and Feasibility Analysis; Reverse Design from Virtual Manufacturing; Quadruple-Arc Gear Tooth Profile Parameterize Optimization Based on ANSYS; Application of Advertising Based on Computer Aided Visual Design; Finite Element Analysis and Multi-Objective Optimization of the Precision Horizontal Machining Center Bed; Calculation of the Scattering Coefficient of Large Scale Periodic Structure…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
248
Artificial Intelligence Research and Development.
Published 2012Table of Contents: “…Using Gabriel Graphs in Borderline-SMOTE to Deal with Severe Two-Class Imbalance Problems on Neural NetworksActive Learning of Actions Based on Support Vector Machines; Towards the Formalization of Re-Identification for Some Data Masking Methods; Natural Language Processing and Recommenders; Towards Object Descriptions in Natural Language from Qualitative Models; Semantically-Enhanced Recommenders; Computer Vision; Supervised Texture Classification Using Optimization Techniques; Modelling Facial Expressions Dynamics with Gaussian Process Regression; Survey on 2D and 3D Human Pose Recovery…”
Full text (MFA users only)
Electronic eBook -
249
Scala for Machine Learning - Second Edition.
Published 2017Full text (MFA users only)
Electronic eBook -
250
Biomedical image understanding : methods and applications
Published 2014Full text (MFA users only)
Electronic eBook -
251
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
252
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Full text (MFA users only)
Electronic eBook -
253
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…Integrated operations in arctic environments / F. wre. Can the semantic web be designed without using fuzzy logic? …”
Full text (MFA users only)
Electronic eBook -
254
The linguistic cerebellum
Published 2015Table of Contents: “…VOICE RECORDING MATERIALVOICE RECORDING SESSION; ANALYSIS ALGORITHM AND EFFECTS; SPINOCEREBELLAR ATAXIA DIAGNOSIS USING SPEECH ANALYSIS; ACOUSTIC FINDINGS IN CEREBELLAR PATIENTS; CONCLUSION; REFERENCES; 8 -- Cerebellum and Writing; INTRODUCTION; WRITING; AGRAPHIA; CEREBELLUM; DISCUSSION; CONCLUSION; REFERENCES; 9 -- The Role of the Cerebellum in Developmental Dyslexia; INTRODUCTION; IS THE CEREBELLUM PART OF THE READING NETWORK?…”
Full text (MFA users only)
Electronic eBook -
255
Informatics for Health
Published 2017Table of Contents: “…An Automatic Approach for Analyzing Treatment Effectiveness Based on Medication Hierarchy -- The Myocardial Infarction Case Study -- Evaluation of Machine Learning Methods to Predict Coronary Artery Disease Using Metabolomic Data -- Dermatology Disease Prediction Based on Two Step Cascade Genetic Algorithm Optimization of ANFIS Parameters -- Querying EHRs with a Semantic and Entity-Oriented Query Language -- Evaluation of the Terminology Coverage in the French Corpus LiSSa -- Linked Data Applications Through Ontology Based Data Access in Clinical Research -- Epidemiological Models Lacking Process Noise Can Be Overconfident -- Disentangling Prognostic and Predictive Biomarkers Through Mutual Information -- IntegrIT -- Towards Utilizing the Swedish National Health Information Exchange Platform for Clinical Research -- Introducing a Method for Transformation of Paper-Based Research Data into Concept-Based Representation with openEHR -- The P̀EARL' Data Warehouse: Initial Challenges Faced with Semantic and Syntactic Interoperability -- Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data -- Application of Correspondence Analysis to Graphically Investigate Associations Between Foods and Eating Locations -- Data Driven Quality Improvement of Health Professions Education: Design and Development of CLUE -- An Interactive Curriculum Data Visualization Tool -- Developing Healthcare Data Analytics APPs with Open Data Science Tools -- Fast and Efficient Feature Engineering for Multi-Cohort Analysis of EHR Data -- Development and Evaluation of a Case-Based Retrieval Service -- Learning Differentially Expressed Gene Pairs in Microarray Data -- Developing a Manually Annotated Corpus of Clinical Letters for Breast Cancer Patients on Routine Follow-Up -- Automated Diagnosis Coding with Combined Text Representations.…”
Full text (MFA users only)
Electronic eBook -
256
Cinder Creative Coding Cookbook.
Published 2013Table of Contents: “…Creating a simple video controllerSaving window content as an image; Saving window animations as video; Saving window content as a vector graphics image; Saving high resolution images with the tile renderer; Sharing graphics between applications; Building Particle Systems; Introduction; Creating a particle system in 2D; Applying repulsion and attraction forces; Simulating particles flying in the wind; Simulating flocking behavior; Making our particles sound reactive; Aligning particles to a processed image; Aligning particles to the mesh surface; Creating springs.…”
Full text (MFA users only)
Electronic eBook -
257
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
258
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
259
Handbook on soft computing for video surveillance
Published 2012Full text (MFA users only)
Electronic eBook -
260
Predictive Analytics For Dummies.
Published 2016Table of Contents: “…Recognizing Your Data TypesStructured and unstructured data; Static and streamed data; Identifying Data Categories; Attitudinal data; Behavioral data; Demographic data; Generating Predictive Analytics; Data-driven analytics; User-driven analytics; Connecting to Related Disciplines; Statistics; Data mining; Machine learning; Chapter 4 Complexities of Data; Finding Value in Your Data; Delving into your data; Data validity; Data variety; Constantly Changing Data; Data velocity; High volume of data; Complexities in Searching Your Data; Keyword-based search; Semantic-based search.…”
Full text (MFA users only)
Electronic eBook