Search Results - (((((((want OR wiant) OR mantis) OR wint) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 81

    Computer Aided Methods in Optimal Design and Operations : Vilnius, Lithuania. by Bogle, I. D. L.

    Published 2006
    Table of Contents: “…General Branch and Bound Algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  2. 82

    Mathematical morphology and its applications to image and signal processing

    Published 2000
    Table of Contents: “…Geodesic Set Definition in Case of Empty Intersection -- The Morphological-Affine Object Deformation -- Affine Invariant Mathematical Morphology Applied to a Generic Shape Recognition Algorithm -- Filtering -- Folding Induced Self-Dual Filters -- Flexible Linear Openings and Closings -- Some Applications of Aperture Filters -- GA Optimisation of Multidimensional Grey-Scale Soft Morphological Filters with Applications in Archive Film Restoration -- Connectivity and Connected Operators -- New Insight on Digital Topology -- Approximate Connectivity and Mathematical Morphology -- Multiresolution Connectivity: An Axiomatic Approach -- Connected Operators Based on Region-Tree Pruning -- Segmentation -- Image Segmentation Based on the Derivative of the Morphological Profile -- Flooding and Segmentation -- A Morphological Multi-Scale Gradient for Color Image Segmentation -- Automatic Watershed Segmentation of Color Images -- Motion Segmentation using Seeded Region Growing -- A Segmentation Pyramid for the Interactive Segmentation of 3-D Images and Video Sequences -- Partition Lattice Operators for Extraction of Semantic Video Objects -- Texture Analysis -- Morphological Granulometric Deconstruction -- Surface Texture Classification from Morphological Transformations -- Content Dependent Image Sampling using Mathematical Morphology: Application to Mipmapping -- Multiresolution Techniques and Scale-Spaces -- Morphological Pyramids and Wavelets Based on the Quincunx Lattice -- Morphological Scale-Space Operators: An Algebraic Framework -- An Idempotent Scale-Space Approach for Morphological Segmentation -- Algorithms -- Efficient Dilation, Erosion, Opening and Closing Algorithms -- Fast Morphological Attribute Operations using Tarjan's Union-Find Algorithm -- A Change Detector Based on Level Sets -- A General Algorithm for Computing Distance Transforms in Linear Time -- The Ordered Queue and the Optimality of the Watershed Approaches -- Discrete 3D Wave Propagation for Computing Morphological Operations from Surface Patches and Unorganized Points -- Applications -- Two-Stage Lossy/Lossless Compression of Grayscale Document Images -- Boosting OCR Classifier by Optimal Edge Noise Filtering -- Morphological Bank Check Logo Segmentation with Few a Priori Knowledge -- Morphological Pseudo Convex Hull to Correct Handwriting Baseline Skew -- Morphological Segmentation of Text and Figures in Renaissance Books (XVI Century) -- Application of Mathematical Morphology and Markov Random Field Theory to the Automatic Extraction of Linear Features in Airborne Images -- Testing Some Morphological Approaches to Face Localization -- Quantitative Description of Telecommunication Networks by Simulation -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 83

    Advances in mechatronics, robotics and automation II : selected, peer reviewed papers from the 2014 2nd International Conference on Mechatronics, Robotics and Automation (ICMRA 201...

    Published 2014
    Table of Contents: “…A New Color Fidelity Fast Denoising Algorithm for High-ISO ImagesA New Video Denoising Algorithm Based on Adaptive Polyview Fusion; A Parallel Stereo Matching Algorithm Core for FPGA Modeled by DSP Builder; A Robust Algorithm for the Inspection of Fastener Head; A Video Compression Coding Algorithm for Network Content Transmission; An Efficient Shape Recognition Method Using Multiple Description Fusion; Clonal Selection Algorithm Based on Manifold Distance for Image Compression; Dot Area Coverage Percentage Measurement Method for Plate Microscopic Image Based on Color Segmentation.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 84

    Mixed Models : Theory and Applications with R. by Demidenko, Eugene

    Published 2013
    Table of Contents: “…2.9 Derivatives of the log-likelihood function -- 2.10 Newton-Raphson algorithm -- 2.11 Fisher scoring algorithm -- 2.11.1 Simplified FS algorithm -- 2.11.2 Empirical FS algorithm -- 2.11.3 Variance-profile FS algorithm -- 2.12 EM algorithm -- 2.12.1 Fixed-point algorithm -- 2.13 Starting point -- 2.13.1 FS starting point -- 2.13.2 FP starting point -- 2.14 Algorithms for restricted MLE -- 2.14.1 Fisher scoring algorithm -- 2.14.2 EM algorithm -- 2.15 Optimization on nonnegative definite matrices -- 2.15.1 How often can one hit the boundary? …”
    Full text (MFA users only)
    Electronic eBook
  5. 85

    Special issue on the discreet element method : numerical modeling of discontinue. by Kuhn, Matthew R.

    Published 2004
    Table of Contents: “…Comparison of experimental and FEM/DEM results for gravitational deposition of identical cubesA 2D polygon/polygon contact model: algorithmic aspects; Selecting a suitable time step for discrete element simulations that use the central difference time integration scheme; Numerical studies of uniaxial powder compaction process by 3D DEM; Thin tunnel liners modelled with particle flow code; Shape selection menu for grand scale discontinua systems.…”
    Full text (MFA users only)
    Electronic eBook
  6. 86
  7. 87

    Optimal structural design : contact problems and high-speed penetration by Banichuk, Nikolaĭ Vladimirovich, Ivanova, S. I︠U︡. (Svetlana I︠U︡rʹevna)

    Published 2017
    Table of Contents: “…Shape optimization of punch moving with friction; 4. …”
    Full text (MFA users only)
    Electronic eBook
  8. 88
  9. 89
  10. 90

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  11. 91

    OIPE 2012

    Published 2014
    Table of Contents: “…Optimization of EMI filters for electrical drives in aircraftAdaptive level set method for accurate boundary shape in optimization of electromagnetic systems; Amodified immune algorithm with spatial filtering for multiobjective topology optimisation of electromagnetic devices; Use of compensation theorem for the robustness assessment of electromagnetic devices optimal design; Multi-physics optimisation of an energy harvester device for automotive application; Stochastic modeling error reduction using Bayesian approach coupled with an adaptive Kriging-based model.…”
    Full text (MFA users only)
    Electronic eBook
  12. 92

    Handbook of Computational Geometry. by Sack, J. R.

    Published 1999
    Table of Contents: “…Arrangements and their applications; Chapter 3. Discrete geometric shapes: Matching, interpolation, and approximation; Chapter 4. …”
    Full text (MFA users only)
    Electronic eBook
  13. 93

    The NURBS Book by Piegl, Les

    Published 1997
    Table of Contents: “…One Curve and Surface Basics -- 1.1 Implicit and Parametric Forms -- 1.2 Power Basis Form of a Curve -- 1.3 Bézier Curves -- 1.4 Rational Bézier Curves -- 1.5 Tensor Product Surfaces -- Exercises -- Two B-Spline Basis Functions -- 2.1 Introduction -- 2.2 Definition and Properties of B-spline Basis Functions -- 2.3 Derivatives of B-spline Basis Functions -- 2.4 Further Properties of the Basis Functions -- 2.5 Computational Algorithms -- Exercises -- Three B-spline Curves and Surfaces -- 3.1 Introduction -- 3.2 The Definition and Properties of B-spline Curves -- 3.3 The Derivatives of a B-spline Curve -- 3.4 Definition and Properties of B-spline Surfaces -- 3.5 Derivatives of a B-spline Surface -- Exercises -- Four Rational B-spline Curves and Surfaces -- 4.1 Introduction -- 4.2 Definition and Properties of NURBS Curves -- 4.3 Derivatives of a NURBS Curve -- 4.4 Definition and Properties of NURBS Surfaces -- 4.5 Derivatives of a NURBS Surface -- Exercises -- Five Fundamental Geometric Algorithms -- 5.1 Introduction -- 5.2 Knot Insertion -- 5.3 Knot Refinement -- 5.4 Knot Removal -- 5.5 Degree Elevation -- 5.6 Degree Reduction -- Exercises -- Six Advanced Geometric Algorithms -- 6.1 Point Inversion and Projection for Curves and Surfaces -- 6.2 Surface Tangent Vector Inversion -- 6.3 Transformations and Projections of Curves and Surfaces -- 6.4 Reparameterization of NURBS Curves and Surfaces -- 6.5 Curve and Surface Reversal -- 6.6 Conversion Between B-spline and Piecewise Power Basis Forms -- Exercises -- Seven Conics and Circles -- 7.1 Introduction -- 7.2 Various Forms for Representing Conics -- 7.3 The Quadratic Rational Bézier Arc -- 7.4 Infinite Control Points -- 7.5 Construction of Circles -- 7.6 Construction of Conies -- 7.7 Conic Type Classification and Form Conversion -- 7.8 Higher Order Circles -- Exercises -- Eight Construction of Common Surfaces -- 8.1 Introduction -- 8.2 Bilinear Surfaces -- 8.3 The General Cylinder -- 8.4 The Ruled Surface -- 8.5 The Surface of Revolution -- 8.6 Nonuniform Scaling of Surfaces -- 8.7 A Three-sided Spherical Surface -- Nine Curve and Surface Fitting -- 9.1 Introduction -- 9.2 Global Interpolation -- 9.3 Local Interpolation -- 9.4 Global Approximation -- 9.5 Local Approximation -- Exercises -- Ten Advanced Surface Construction Techniques -- 10.1 Introduction -- 10.2 Swung Surfaces -- 10.3 Skinned Surfaces -- 10.4 Swept Surfaces -- 10.5 Interpolation of a Bidirectional Curve Network -- 10.6 Coons Surfaces -- Eleven Shape Modification Tools -- 11.1 Introduction -- 11.2 Control Point Repositioning -- 11.3 Weight Modification -- 11.4 Shape Operators -- 11.5 Constraint-based Curve and Surface Shaping -- Twelve Standards and Data Exchange -- 12.1 Introduction -- 12.2 Knot Vectors -- 12.3 Nurbs Within the Standards -- 12.4 Data Exchange to and from a NURBS System -- Thirteen B-spline Programming Concepts -- 13.1 Introduction -- 13.2 Data Types and Portability -- 13.3 Data Structures -- 13.4 Memory Allocation -- 13.5 Error Control -- 13.6 Utility Routines -- 13.7 Arithmetic Routines -- 13.8 Example Programs -- 13.9 Additional Structures -- 13.10 System Structure -- References.…”
    Full text (MFA users only)
    Electronic eBook
  14. 94
  15. 95

    Media technologies : essays on communication, materiality, and society

    Published 2014
    Table of Contents: “…Bowker -- "What Do We Want?" "Materiality!" "When Do We Want It?" "Now!" …”
    Full text (MFA users only)
    Electronic eBook
  16. 96

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  17. 97
  18. 98

    Applied modelling, numerical simulation, computation and optimization. by De Souza Neto, Eduardo

    Published 2017
    Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
    Full text (MFA users only)
    Electronic eBook
  19. 99

    Firewall design and analysis by Liu, Alex X.

    Published 2011
    Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
    Full text (MFA users only)
    Electronic eBook
  20. 100

    Ivor Horton's beginning Visual C++ 2012 by Horton, Ivor

    Published 2012
    Table of Contents: “…Algorithms --…”
    Full text (MFA users only)
    Electronic eBook