Search Results - (((((((ant OR anti) OR semantic) OR wind) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 361

    Beyond artificial intelligence : from human consciousness to artificial consciousness by Cardon, Alain, 1946-

    Published 2018
    Table of Contents: “…The morphological and semantic conformation of the psychic system; 1.13. …”
    Full text (MFA users only)
    Electronic eBook
  2. 362

    Chemical, mechanical and materials engineering : selected, peer reviewed papers from the 2011 International Conference on Chemical, Mechanical and Materials Engineering (CMME2011),...

    Published 2011
    Table of Contents: “…Preparation and Exothermic Characterization of Dioctyl Sebacate (DOS)-Coated Aluminum NanopowdersApplication of Genetic Algorithm in Chemical Reaction Kinetics; Molten Slag Structure and Diffusion Coefficients of Cr3+ and Si4+ during Micro-Carbon Cr-Fe Alloy Production; Dynamic Crushing of Hexagonal Honeycombs under In-Plane Loading; Application of LOD Technology in the 3DVR Remote Control Platform for Shearer; Bearing Fault Diagnosis Based on Probability Boxes Theory and SVM Method; Study on Industry Process of the Rubber Anti-Oxidant RD…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 363

    Computational phraseology

    Published 2020
    Table of Contents: “…Monocollocable words : a type of language combinatory periphery / František Čermák -- Translation asymmetries of multiword expressions in machine translation : an analysis of the TED-MWE corpus / Johanna Monti, Mihael Arcan and Federico Sangati -- German constructional phrasemes and their Russian counterparts : a corpus-based study / Dmitrij Dobrovol'skij -- Computational phraseology and translation studies : from theoretical hypotheses to practical tools / Jean-Pierre Colson -- Computational extraction of formulaic sequences from corpora : two case studies of a new extraction algorithm / Alexander Wahl and Stefan Th. Gries -- Computational phraseology discovery in corpora with the MWETOOLKIT / Carlos Ramisch -- Multiword expressions in comparable corpora / Peter Ďurčo -- Collecting collocations from general and specialised corpora : a comparative analysis / Marie-Claude L'Homme and Daphnée Azoulay -- What matters more : the size of the corpora or their quality? …”
    Full text (MFA users only)
    Electronic eBook
  4. 364

    The generative and the structuralist approach to the syllable : a comparative analysis of English and Slovak by Gregová, Renáta

    Published 2016
    Table of Contents: “…The Analysis; 3.2.2 The Syllable Structure Algorithm in Slovak; 3.2.2.1. Some Special Issues of Slovak Phonology; 3.2.2.1.1 Is Slovak ' j' a glide?…”
    Full text (MFA users only)
    Electronic eBook
  5. 365
  6. 366

    Thermophysical aspects of re-entry flows

    Published 1986
    Table of Contents: “…Studies of Potential Fluid-Mechanical Mechanisms for Enhanced Stagnation-Region HeatingMeasured and Predicted Vortex-Induced Leeward Heating on a Biconic at Mach 6 and 10 -- Heating Rate Distributions at Mach 10 on a Circular-Body Earth-to-Orbit Transport Vehicle -- Developments in Aerothermal Test Techniques at the AEDC Supersonic/Hypersonic Wind Tunnels -- Application of Numerical Simulation to Enhance Arcjet Performance -- Effects of Surface Discontinuities on Convective Heat Transfer in Hypersonic Flow -- Chapter IV. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 367

    Advanced Research on Material Engineering, Chemistry, Bioinformatics III : Selected, Peer Reviewed Papers from the 2013 3rd International Conference on Material Engineering, Chemis...

    Published 2014
    Table of Contents: “…Advanced Research on Material Engineering, Chemistry, Bioinformatics III; Preface and Committee; Table of Contents; Chapter 1: Material Engineering and Applied Mechanics; Phase-Field Micro-Solidification Simulation for Dendrite Growth in Ni-Cu Binary Alloy; Research in Non-Isothermal Crystallization Kinetics of LDPE and Inorganic Particle Composite Films; Wear Mechanisms Analysis of Material 20Cr2Ni4A; Wind Tunnel Test of Effect of Sound-Absorbing Material on Lift of Two-Element Airfoil; Preparation of Compound Clinoptilolite Filter Material and Performance of Ammonia Nitrogen Removal…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 368

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  9. 369

    Better living through economics

    Published 2010
    Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  10. 370

    Exploratory data analysis with MATLAB by Martinez, Wendy L., Martinez, Angel R., Solka, Jeffrey

    Published 2017
    Table of Contents: “…5.5.2 Probabilistic Latent Semantic Analysis5.6 Minimum Spanning Trees and Clustering; 5.6.1 Definitions; 5.6.2 Minimum Spanning Tree Clustering; 5.7 Evaluating the Clusters; 5.7.1 Rand Index; 5.7.2 Cophenetic Correlation; 5.7.3 Upper Tail Rule; 5.7.4 Silhouette Plot; 5.7.5 Gap Statistic; 5.7.6 Cluster Validity Indices; 5.8 Summary and Further Reading; Exercises; Chapter 6 Model-Based Clustering; 6.1 Overview of Model-Based Clustering; 6.2 Finite Mixtures; 6.2.1 Multivariate Finite Mixtures; 6.2.2 Component Models -- Constraining the Covariances; 6.3 Expectation-Maximization Algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  11. 371

    Applied mechanics and manufacturing technology : selected, peer reviewed papers of the 2011 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2011),...

    Published 2011
    Table of Contents: “…Multiobjective Optimization of Hybrid Electrical Vehicle Powertrain Mounting System Using Hybrid Genetic AlgorithmMechanical Properties and Reinforcement Mechanism of Amorphous Particles Reinforced Aluminum Matrix Composites; Error Analysis Model of Aircraft Multi-Joint Assembly Based on Linkage Mechanism Theory; Layup Analyzing of a Carbon/Glass Hybrid Composite Wind Turbine Blade Using Finite Element Analysis; Analysis of A/C Double Angular Milling Head's Performance; Analysis on the Thermal Error Compensation Model of Direct-Drive A/C Bi-Rotary Milling Head.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  12. 372

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  13. 373

    SMS communication : a linguistic approach

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  14. 374

    Twelfth Scandinavian Conference on Artificial Intelligence : SCAI 2013

    Published 2013
    Table of Contents: “…Traceable Uncertainty for Threat Evaluation in Air to Ground ScenariosKnowledge-Based Industrial Robotics; Probabilistic Inference in BN2T Models by Weighted Model Counting; Doctoral Symposium; On Programming Organization-Aware Agents; Enhancing Recall in Semantic Querying; Industrial Robot Skills; Learning Inverse Kinematics Problem in Changing Task Environment; Neural Network for Prediction of Glucose Concentration in Type 1 Diabetic Patients; Subject Index; Author Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 375

    Structural-functional studies in English grammar : in honor of Lachlan Mackenzie

    Published 2007
    Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
    Full text (MFA users only)
    Electronic eBook
  16. 376

    Measurement technology and its application III : selected, peer reviewed papers from the 2014 3rd International Conference on Measurement, Instrumentation and Automation (ICMIA 201...

    Published 2014
    Table of Contents: “…The Displacement Measurement of Ground Wind Loads for Launch VehicleThe Relations between UT1 Precision and Radio Source Sky-Coverage; The Research of GPS Elevation Fitting Considering the Influence of Covariance Function; Enabling Standardization in Shear Bond Strength Tests for Orthodontic Adhesives on Natural Teeth by Using an Innovative Grip Accessory for the Testing Machine; Knock Detection and Evaluation of Kerosene Piston Engine; Correction of the Popular Bias Test Method Recommended by ISO/TS16949 for Manufacturing Industries.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 377

    Mechanical, Electronic and Information Technology Engineering

    Published 2015
    Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 378

    Robotics : science and systems III

    Published 2008
    Table of Contents: “…Semantic Modeling of Places using Objects / Ananth Ranganathan and Frank Dellaert -- Design of a Bio-inspired Dynamical Vertical Climbing Robot / Jonathan E. …”
    Full text (MFA users only)
    Electronic eBook
  19. 379

    Conversations on violence : an anthology

    Published 2021
    Table of Contents: “…What Does an Anti-Fascist Life Feel Like? -- Natasha Lennard -- 16. …”
    Full text (MFA users only)
    Electronic eBook
  20. 380

    Advanced Analytics with R and Tableau. by Stirrup, Jen

    Published 2016
    Table of Contents: “…; How to do Clustering in Tableau; Creating Clusters; Clustering example in Tableau; Creating a Tableau group from cluster results; Constraints on saving Clusters; Interpreting your results; How Clustering Works in Tableau; The clustering algorithm; Scaling; Clustering without using k-means; Hierarchical modeling; Statistics for Clustering; Describing Clusters -- Summary tab; Testing your Clustering.…”
    Full text (MFA users only)
    Electronic eBook