Search Results - (((((((want OR manthe) OR find) OR mantic) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 47
- Machine learning 34
- Artificial intelligence 29
- Data mining 27
- Mathematical models 25
- Mathematics 23
- algorithms 20
- artificial intelligence 20
- methods 20
- Algorithms 18
- Python (Computer program language) 16
- Computer algorithms 15
- Research 15
- Computer networks 14
- Artificial Intelligence 12
- Data Mining 12
- Management 12
- Neural networks (Computer science) 12
- R (Computer program language) 12
- Development 11
- Diseases 11
- Mathematical optimization 11
- Social aspects 11
- Application software 10
- Big data 10
- Bioinformatics 10
- Digital techniques 10
- Image processing 10
- Signal processing 10
- Statistical methods 10
Search alternatives:
- manthe »
- find »
- mantic »
- halted »
- granting »
-
161
Randomness and complexity : from Leibniz to Chaitin
Published 2007Table of Contents: “…Martin Davis -- The Turing Post Language -- Codes for Turing Post Programs -- The Universal Program -- The Halting Problem -- Other Unsolvable Problems -- Undecidable Statements -- Complexity and Randomness -- Unsolvability of Halting Problem -- An Unsolvable Word Problem -- 6. …”
Full text (MFA users only)
Electronic eBook -
162
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Table of Contents: “…2.4 Techniques for Proving Inapproximability Results for String Barcoding Problems2.5 Heuristic Algorithms for String Barcoding Problems; 2.6 Conclusion; Acknowledgments; References; Chapter 3: Alignment-Free Measures for Whole-Genome Comparison; 3.1 Introduction; 3.2 Whole-Genome Sequence Analysis; 3.3 Underlying Approach; 3.4 Experimental Results; 3.5 Conclusion; Author's Contributions; 3.6 Acknowledgments; References; Chapter 4: A Maximum Likelihood Framework for Multiple Sequence Local Alignment; 4.1 Introduction; 4.2 Multiple Sequence Local Alignment; 4.3 Motif Finding Algorithms.…”
Full text (MFA users only)
Electronic eBook -
163
Machine Learning with Core ML : an IOS Developer's Guide to Implementing Machine Learning in Mobile Apps.
Published 2018Table of Contents: “…Learning algorithms Auto insurance in Sweden; Supported learning algorithms; Considerations ; Summary; Chapter 3: Recognizing Objects in the World; Understanding images; Recognizing objects in the world; Capturing data ; Preprocessing the data; Performing inference ; Summary ; Chapter 4: Emotion Detection with CNNs; Facial expressions; Input data and preprocessing ; Bringing it all together; Summary ; Chapter 5: Locating Objects in the World; Object localization and object detection ; Converting Keras Tiny YOLO to Core ML; Making it easier to find photos; Optimizing with batches; Summary.…”
Full text (MFA users only)
Electronic eBook -
164
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
165
-
166
Handbook of power systems. II
Published 2010Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
Full text (MFA users only)
Electronic eBook -
167
-
168
-
169
Placement preparation : more than 1000 questions
Published 2006Full text (MFA users only)
Electronic eBook -
170
Recent advances in hybrid metaheuristics for dataclustering
Published 2020Table of Contents: “…2.3.5 Term Weight (TF-IDF) -- 2.4 Text Feature Selection -- 2.4.1 Mathematical Model of the Feature Selection Problem -- 2.4.2 Solution Representation -- 2.4.3 Fitness Function -- 2.5 Harmony Search Algorithm -- 2.5.1 Parameters Initialization -- 2.5.2 Harmony Memory Initialization -- 2.5.3 Generating a New Solution -- 2.5.4 Update Harmony Memory -- 2.5.5 Check the Stopping Criterion -- 2.6 Text Clustering -- 2.6.1 Mathematical Model of the Text Clustering -- 2.6.2 Find Clusters Centroid -- 2.6.3 Similarity Measure -- 2.7 k-means text clustering algorithm -- 2.8 Experimental Results…”
Full text (MFA users only)
Electronic eBook -
171
Compressed sensing : theory and applications
Published 2012Table of Contents: “…Graphical models concepts in compressed sensing / Andrea Montanari -- 10. Finding needles in compressed haystacks / Robert Calderbank and Sina Jafarpour -- 11. …”
Full text (MFA users only)
Electronic eBook -
172
Applications of swarm intelligence
Published 2011Table of Contents: “…Algorithm for Ms3 ""; ""4.4. Ms4: Combination of Ms1 and Ms2 ""; ""4.5. …”
Full text (MFA users only)
Electronic eBook -
173
-
174
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
175
-
176
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
177
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
178
Machine Learning for Asset Management New Developments and Financial Applications
Published 2020Table of Contents: “…Significant features -- 2.5. Results and findings -- 2.5.1. Descriptive statistics of the data -- 2.5.2. …”
Full text (MFA users only)
Electronic eBook -
179
-
180
Electronic warfare target location methods
Published 2012Full text (MFA users only)
Electronic eBook