Search Results - (((((((ant OR giant) OR wants) OR art) OR cantor) OR anne) OR maarten) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 47
- Mathematical models 42
- Machine learning 35
- Artificial intelligence 34
- Mathematical optimization 28
- Mathematics 25
- artificial intelligence 21
- Data mining 20
- Algorithms 18
- Computer networks 17
- algorithms 17
- Artificial Intelligence 14
- Digital techniques 13
- History 12
- Neural networks (Computer science) 12
- Python (Computer program language) 12
- Computer simulation 11
- Data Mining 11
- Development 11
- Electronic data processing 11
- Machine Learning 11
- Management 11
- Security measures 11
- Application software 10
- Bioinformatics 10
- Computer algorithms 10
- Information technology 10
- Philosophy 10
- Social aspects 10
- Technological innovations 9
Search alternatives:
- ant »
- giant »
- wants »
- cantor »
-
481
Advanced Computational Electromagnetic Methods.
Published 2015Table of Contents: “…2.7 ADVANCED FORMS OF HIGH-ORDER FDTD ALGORITHMS -- REFERENCES -- 3.1 INTRODUCTION -- 3.2 FDTD CODE FOR MICROWAVE CIRCUIT SIMULATION -- 3.3 FDTD CODE USING CUDA -- 3.4 NUMERICAL RESULTS -- REFERENCES -- 4.1 INTRODUCTION -- 4.2 CURRENT STATE OF THE ART -- 4.3 FDTD EARTH-IONOSPHERE MODEL OVERVIEW -- 4.4 NEW MAGNETIZED IONOSPHERIC PLASMA ALGORITHM -- 4.5 STOCHASTIC FDTD (S-FDTD) -- 4.6 INPUT TO FDTD/S-FDTD EARTH-PLAMSA IONOSPHERE MODELS -- 4.7 CONCLUSIONS -- REFERENCES -- 5.1 INTRODUCTION -- 5.2 ENVIRONMENT REQUIREMENTS AND SETTINGS -- 5.3 CODE DEVELOPMENT -- 5.4 NUMERICAL RESULTS -- REFERENCES -- 6.1 FETI METHODS WITH ONE AND TWO LAGRANGE MULTIPLIERS -- 6.2 FETI-DP METHODS WITH ONE AND TWO LAGRANGE MULTIPLIERS -- 6.3 LM-BASED NONCONFORMAL FETI-DP METHOD -- 6.4 CE-BASED NONCONFORMAL FETI-DP METHOD -- 6.5 FETI-DP METHOD ENHANCED BY THE SECOND-ORDER TRANSMISSION CONDITION -- 6.6 HYBRID NONCONFORMAL FETI/CONFORMAL FETI-DP METHOD -- 6.7 NUMERICAL EXAMPLES -- 6.8 SUMMARY -- REFERENCES -- 7.1 NORMALIZED RESIDUAL ERROR -- 7.2 HIGH-ORDER TREATMENT OF SMOOTH TARGETS -- 7.3 THE DIPOLE ANTENNA -- 7.4 HIGH-ORDER TREATMENT OF WEDGE SINGULARITIES -- 7.5 HIGH-ORDER TREATMENT OF JUNCTIONS -- 7.7 PROSPECTS FOR CONTROLLED ACCURACY COMPUTATIONS IN THREE-DIMENSIONAL PROBLEMS -- 7.8 SUMMARY -- REFERENCES -- 8.1 INTRODUCTION -- 8.2 LOW RANK PROPERTY OF SUBMATRICES OF PARTITIONED IMPEDANCE MATRIX -- 8.3 PARTITIONING OF THE COMPUTATIONAL DOMAIN -- 8.4 LOW RANK MATRIX DECOMPOSITION -- 8.5 LOW RANK DECOMPOSITION OF MULTIPLE RIGHT SIDES -- 8.6 DIRECT SOLVER BASED ON BLOCK LU DECOMPOSITION -- 8.7 PARALLELIZATION VIA OPENMP AND BLAS LIBRARY -- 8.8 NUMERICAL EXAMPLES -- 8.9 SUMMARY -- REFERENCES -- 9.1 INTRODUCTION -- 9.2 PHYSICS-BASED MODELING FOR THE ANALYSIS OF THE MACHINE DRIVE -- 9.3 EQUIVALENT SOURCE MODELING -- 9.4 POWER CONVERTERS.…”
Full text (MFA users only)
Electronic eBook -
482
Linearization and efficiency enhancement techniques for silicon power amplifiers : from RF to mmW
Published 2015Full text (MFA users only)
Electronic eBook -
483
Computer vision and imaging in intelligent transportation systems
Published 2017Full text (MFA users only)
Electronic eBook -
484
-
485
Creating wicked students : designing courses for a complex world
Published 2018Full text (MFA users only)
Electronic eBook -
486
IP multicast with applications to IPTV and mobile DVB-H
Published 2008Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
Full text (MFA users only)
Electronic eBook -
487
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
488
Fractional order systems : modeling and control applications
Published 2010Table of Contents: “…Actuation mechanism on IPMCs. 8.4. State-of-the-art for IPMC models. 8.5. Experimental setup. 8.6. …”
Full text (MFA users only)
Electronic eBook -
489
Methods and Interdisciplinarity
Published 2020Table of Contents: “…Simulation in geography and algorithmic thinking; 2.3.1. A difficult path; 2.3.2. …”
Full text (MFA users only)
Electronic eBook -
490
Risk Modeling, Assessment, and Management.
Published 2015Table of Contents: “…Intro -- Title page -- Table of Contents -- Preface to the Fourth Edition -- The Companion Website -- Acknowledgments -- ACKNOWLEDGMENTS TO THE FIRST EDITION -- ACKNOWLEDGMENTS TO THE SECOND EDITION -- ACKNOWLEDGMENTS TO THE THIRD EDITION -- ACKNOWLEDGMENTS TO THE FOURTH EDITION -- Part I: Fundamentals of Risk Modeling, Assessment, and Management -- 1 The Art and Science of Systems and Risk Analysis -- 1.1 INTRODUCTION -- 1.2 SYSTEMS ENGINEERING -- 1.3 RISK ASSESSMENT AND MANAGEMENT -- 1.4 CONCEPT ROAD MAP -- 1.5 EPILOGUE -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
491
Semantic matchmaking with nonmonotonic description logics
Published 2009Full text (MFA users only)
Electronic eBook -
492
Educational Data Mining with R and Rattle.
Published 2016Table of Contents: “…1.4.3 Objectives1.5 R Data Mining Tool; 1.5.1 R Installation; 1.5.2 R Mining; 1.6 Rattle Data Mining Tool; 1.6.1 Rattle Installation; 1.6.2 Loading Rattle Package; 1.7 Reason for R and Rattle; Chapter 2 -- Emerging Research Directions in Educational Data Mining; 2.1 Introduction; 2.2 Prior Art Vis-à-vis of Research; 2.2.1 Educational Data Mining; 2.2.2 Data Mining Using R; 2.2.3 Mining Students' Academic Performance; 2.2.4 Factors Affecting on Students' Academic Performance; 2.2.5 Evaluation of Student Performance; 2.2.6 Knowledge Management System; 2.2.7 Placement Chance Prediction.…”
Full text (MFA users only)
Electronic eBook -
493
Nuclear Magnetic Resonance Spectroscopy Of Liquid Crystals.
Published 2009Full text (MFA users only)
Electronic eBook -
494
An introduction to statistical computing : a simulation-based approach
Published 2013Full text (MFA users only)
Electronic eBook -
495
-
496
-
497
-
498
-
499
Computational Paralinguistics : Emotion, Affect and Personality in Speech and Language Processing.
Published 2013Full text (MFA users only)
Electronic eBook -
500
Atlas of minimally invasive surgery for lung and esophageal cancer
Published 2017Full text (MFA users only)
Electronic eBook