Search Results - (((((((ant OR gikant) OR santis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 42
- Mathematics 39
- Mathematical models 35
- Mathematical optimization 26
- artificial intelligence 26
- Machine learning 25
- Algorithms 24
- algorithms 21
- Social aspects 18
- Artificial Intelligence 17
- Technological innovations 17
- Computer networks 16
- Data mining 16
- History 14
- Computer algorithms 13
- Digital techniques 12
- Information technology 12
- Research 12
- Statistical methods 12
- methods 12
- Design and construction 11
- Image processing 11
- Python (Computer program language) 11
- Development 10
- Engineering 10
- Neural networks (Computer science) 10
- Application software 9
- Automation 9
- Big data 9
Search alternatives:
- ant »
- gikant »
- santis »
- cantor »
-
561
Analytics stories : using data to make good things happen
Published 2021Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
Full text (MFA users only)
Electronic eBook -
562
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
563
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
564
Vehicle Dynamics.
Published 2015Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
Full text (MFA users only)
Electronic eBook -
565
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
566
Handbook of convex optimization methods in imaging science
Published 2017Full text (MFA users only)
Electronic eBook -
567
Stochastic filtering with applications in finance
Published 2010Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
Full text (MFA users only)
Electronic eBook -
568
Essentials of Monte Carlo Simulation : Statistical Methods for Building Simulation Models.
Published 2012Full text (MFA users only)
Electronic eBook -
569
Data Analysis and Applications 1 : New and Classical Approaches.
Published 2019Table of Contents: “…Similarity to homogeneous distributional shapes1.3.11. Stability; 1.3.12. Further Aspects; 1.4. …”
Full text (MFA users only)
Electronic eBook -
570
Advanced mathematical & computational tools in metrology & testing VIII
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
571
The structure of amorphous materials using molecular dynamics
Published 2023Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
Full text (MFA users only)
Electronic eBook -
572
Language processing and grammars : the role of functionally oriented computational models
Published 2014Full text (MFA users only)
Electronic eBook -
573
The method of the generalised eikonal : new approaches in the Diffraction Theory.
Published 2015Full text (MFA users only)
Electronic eBook -
574
Statistical learning from a regression perspective
Published 2008Full text (MFA users only)
Electronic eBook -
575
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
Full text (MFA users only)
Electronic eBook -
576
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Full text (MFA users only)
Electronic eBook -
577
Power system wide-area stability analysis and control
Published 2018Full text (MFA users only)
Electronic eBook -
578
The internet of things and big data analytics integrated platforms and industry use cases
Published 2020Full text (MFA users only)
Electronic eBook -
579
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
580