Search Results - (((((((ant OR giwant) OR wants) OR arts) OR cantor) OR anne) OR maarten) OR hints) algorithms.

  1. 481

    Cloud computing and virtualization

    Published 2018
    Table of Contents: “…5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.…”
    Full text (MFA users only)
    Electronic eBook
  2. 482

    Yttrium : compounds, production and applications

    Published 2011
    Table of Contents: “…Spot Size ; 4.4. Fluence ; 4.5. Algorithm ; 5. DEFINITION OF VASCULAR PATHOLOGY ; 6. …”
    Full text (MFA users only)
    Electronic eBook
  3. 483

    The structure of amorphous materials using molecular dynamics by Massobrio, C. (Carlo)

    Published 2023
    Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
    Full text (MFA users only)
    Electronic eBook
  4. 484
  5. 485

    RFID systems : research trends and challenges

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  6. 486
  7. 487

    Pancreatology : a clinical casebook

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  8. 488
  9. 489
  10. 490

    Scala Machine Learning Projects : Build real-world machine learning and deep learning projects with Scala. by Karim, Md. Rezaul

    Published 2018
    Table of Contents: “…-- Project structure -- Running the Scala Play web app -- Summary -- Chapter 4: Population-Scale Clustering and Ethnicity Prediction -- Population scale clustering and geographic ethnicity -- Machine learning for genetic variants -- 1000 Genomes Projects dataset description -- Algorithms, tools, and techniques -- H2O and Sparkling water -- ADAM for large-scale genomics data processing -- Unsupervised machine learning -- Population genomics and clustering -- How does K-means work? …”
    Full text (MFA users only)
    Electronic eBook
  11. 491

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  12. 492

    Memory Allocation Problems in Embedded Systems : Optimization Methods. by Soto, Maria

    Published 2013
    Table of Contents: “…Memory management for decreasing power consumption; 1.3. State of the art in optimization techniques for memory management and data assignment; 1.3.1. …”
    Full text (MFA users only)
    Electronic eBook
  13. 493

    A Polygeneration Process Concept for Hybrid Solar and Biomass Power Plant : Simulation, Modeling, and Optimization. by Sahoo, Umakanta

    Published 2018
    Table of Contents: “…Cover; Title Page; Copyright Page; Contents; Foreword; Preface; 1 Introduction; 1.1 Global Scenario on Renewable Energy; 1.2 Indian Scenario on Renewable Energy; Exercise; References; 2 State-of-the-Art Concentrated Solar Thermal Technologies for End Use Applications; 2.1 Solar Thermal Technologies for Low Grade Heat Applications; 2.1.1 Flat Plate Collector System; 2.1.2 Built-In Storage Solar Water Heating System; 2.1.3 Evacuated Tubular Collector System; ETC Water Heating System Specification; 2.1.4 Cumulative Growth of SWHS Installation Capacity; 2.1.5 Performance Evaluation of SWHs.…”
    Full text (MFA users only)
    Electronic eBook
  14. 494

    Adaptive processing of brain signals by Sanei, Saeid

    Published 2013
    Table of Contents: “…262 -- 11.8 Emotion-Related Brain Signal Processing 263 -- 11.9 Other Neuroimaging Modalities Used for Emotion Study 264 -- 11.10 Applications 267 -- 11.11 Conclusions 268 -- References 268 -- 12 Sleep and Sleep Apnoea 274 -- 12.1 Introduction 274 -- 12.2 Stages of Sleep 275 -- 12.2.1 NREM Sleep 275 -- 12.2.2 REM Sleep 277 -- 12.3 The Influence of Circadian Rhythms 278 -- 12.4 Sleep Deprivation 279 -- 12.5 Psychological Effects 280 -- 12.6 Detection and Monitoring of Brain Abnormalities During Sleep by EEG Analysis 281 -- 12.6.1 Analysis of Sleep Apnoea 281 -- 12.6.2 Detection of the Rhythmic Waveforms and Spindles Employing Blind Source Separation 282 -- 12.6.3 Application of Matching Pursuit 282 -- 12.6.4 Detection of Normal Rhythms and Spindles Using Higher Order Statistics 285 -- 12.6.5 Application of Neural Networks 287 -- 12.6.6 Model-Based Analysis 288 -- 12.6.7 Hybrid Methods 290 -- 12.7 EEG and Fibromyalgia Syndrome 290 -- 12.8 Sleep Disorders of Neonates 291 -- 12.9 Dreams and Nightmares 291 -- 12.10 Conclusions 292 -- References 292 -- 13 Brain-Computer Interfacing 295 -- 13.1 Introduction 295 -- 13.2 State of the Art in BCI 296 -- 13.3 BCI-Related EEG Features 300 -- 13.3.1 Readiness Potential and Its Detection 300 -- 13.3.2 ERD and ERS 300 -- 13.3.3 Transient Beta Activity after the Movement 302 -- 13.3.4 Gamma Band Oscillations 302 -- 13.3.5 Long Delta Activity 303 -- 13.4 Major Problems in BCI 303 -- 13.4.1 Pre-Processing of the EEGs 304 -- 13.5 Multidimensional EEG Decomposition 306 -- 13.5.1 Space-Time-Frequency Method 308 -- 13.5.2 Parallel Factor Analysis 309 -- 13.6 Detection and Separation of ERP Signals 310 -- 13.7 Estimation of Cortical Connectivity 311 -- 13.8 Application of Common Spatial Patterns 314 -- 13.9 Multiclass Brain-Computer Interfacing 316 -- 13.10 Cell-Cultured BCI 318 -- 13.11 Conclusions 319 -- References 320 -- 14 EEG and MEG Source Localization 325 -- 14.1 Introduction 325 -- 14.2 General Approaches to Source Localization 326 -- 14.2.1 Dipole Assumption 327 -- 14.3 Most Popular Brain Source Localization Approaches 329 -- 14.3.1 ICA Method 329 -- 14.3.2 MUSIC Algorithm 329 -- 14.3.3 LORETA Algorithm 333 -- 14.3.4 FOCUSS Algorithm 335 -- 14.3.5 Standardised LORETA 335 -- 14.3.6 Other Weighted Minimum Norm Solutions 336 -- 14.3.7 Evaluation Indices 338 -- 14.3.8 Joint ICA-LORETA Approach 338 -- 14.3.9 Partially Constrained BSS Method 340 -- 14.3.10 Constrained Least-Squares Method for Localization of P3a and P3b 341 -- 14.3.11 Spatial Notch Filtering Approach 342 -- 14.3.12 Deflation Beamforming Approach for EEG/MEG Multiple Source Localization 347 -- 14.3.13 Hybrid Beamforming -- Particle Filtering 351 -- 14.4 Determination of the Number of Sources from the EEG/MEG Signals 353 -- 14.5 Conclusions 355 -- References 356 -- 15 Seizure and Epilepsy 360 -- 15.1 Introduction 360 -- 15.2 Types of Epilepsy 362 -- 15.3 Seizure Detection 365 -- 15.3.1 Adult Seizure Detection 365 -- 15.3.2 Detection of Neonate Seizure 371 -- 15.4 Chaotic Behaviour of EEG Sources 376 -- 15.5 Predictability of Seizure from the EEGs 378 -- 15.6 Fusion of EEG -- fMRI Data for Seizure Detection and Prediction 391 -- 15.7 Conclusions 391 -- References 392 -- 16 Joint Analysis of EEG and fMRI 397 -- 16.1 Fundamental Concepts 397 -- 16.1.1 Blood Oxygenation Level Dependent 399 -- 16.1.2 Popular fMRI Data Formats 400 -- 16.1.3 Preprocessing of fMRI Data 401 -- 16.1.4 Relation between EEG and fMRI 401 -- 16.2 Model-Based Method for BOLD Detection 403 -- 16.3 Simultaneous EEG-fMRI Recording: Artefact Removal from EEG 405 -- 16.3.1 Gradient Artefact Removal 405 -- 16.3.2 Ballistocardiogram Artefact Removal 406 -- 16.4 BOLD Detection in fMRI 413 -- 16.4.1 Implementation of Different NMF Algorithms for BOLD Detection 414 -- 16.4.2 BOLD Detection Experiments 416 -- 16.5 Fusion of EEG and fMRI 419 -- 16.5.1 Extraction of fMRI Time-Course from EEG 419 -- 16.5.2 Fusion of EEG and fMRI, Blind Approach 241 -- 16.5.3 Fusion of EEG and fMRI, Model-Based Approach 425 -- 16.6 Application to Seizure Detection 425 -- 16.7 Conclusions 427 -- References 427.…”
    Full text (MFA users only)
    Electronic eBook
  15. 495

    Handbook of constraint programming

    Published 2006
    Full text (MFA users only)
    Electronic eBook
  16. 496

    Network and system security

    Published 2014
    Table of Contents: “…Statistical Analysis -- 24. Signature Algorithms -- 25. Local Area Network Security Countermeasures Implementation Checklist -- 26. …”
    Full text (MFA users only)
    Electronic eBook
  17. 497

    Mastering mobile learning

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  18. 498
  19. 499

    Hands-On Deep Learning with TensorFlow. by Boxel, Dan Van

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  20. 500

    Contemporary Ergonomics 1998. by Hanson, Margaret A.

    Published 1998
    Table of Contents: “…Development of a questionnaire to measure attitudes towards virtual reality -- Orientation of blind users on the World Wide Web -- F̃lash, splash and crash:̃ Human factors and the implementation of innovative Web technologies -- Determining ergonomic factors in stress from work demands of nurses -- A risk assessment and control cycle approach to managing workplace stress -- Teleworking: Assessing the risks -- Evaluating teleworking -- case study -- Team organisational mental models: an integrative framework for research -- The impact of ITT on virtual team working in the European automotive industry -- The effect of communication processes upon workers and job efficiency -- A case study of job design in a steel plant -- The effects of age and habitual physical activity on the adjustment to nocturnal shiftwork -- Job design for university technicians: work activity and allocation of function -- Allocation of functions and manufacturing job design based on knowledge requirements -- The need to specify cognition within system requirements -- Analysis of complex communication tasks -- Health and safety as the basis for specifying information systems design requirements -- Cognitive algorithms -- Rapid prototyping in foam of 3D anthropometric computer models in functional postures -- The use of high and low level prototyping methods for product user interfaces -- Creative collaboration in engineering design teams -- Pleasure and product semantics -- A survey of usability practice and needs in Europe -- Cultural influence in usability assessment -- Interface display designs based on operator knowledge requirements -- Understanding what makes icons effective: how subjective ratings can inform design -- Representing uncertainty in decision support systems: the state of the art.…”
    Full text (MFA users only)
    Electronic eBook