Search Results - (((((((ant OR granting) OR semantic) OR wind) OR cantor) OR anne) OR slave) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 37
- Data processing 23
- Mathematics 20
- artificial intelligence 18
- Mathematical optimization 17
- Machine learning 16
- Mathematical models 16
- Technological innovations 16
- Data mining 15
- Algorithms 12
- Artificial Intelligence 11
- algorithms 11
- Computer science 10
- Information technology 10
- Neural networks (Computer science) 9
- Design and construction 8
- Manufacturing processes 8
- Research 8
- Big data 7
- Computational linguistics 7
- Data Mining 7
- Electric power systems 7
- Management 7
- Mechatronics 7
- Social aspects 7
- Automatic control 6
- Computer algorithms 6
- Computer networks 6
- Computer security 6
- History 6
Search alternatives:
- ant »
- granting »
- semantic »
- cantor »
- wind »
-
341
D Cookbook.
Published 2014Table of Contents: “…Performing type conversionsFinding the largest files in a directory; Creating a network client and server; Using Base64 to create a data URI; Generating random numbers; Normalizing a string and performing Unicode comparisons; Searching with regular expressions; Writing a digest utility; Using std.zlib compression; Using the std.json module; Chapter 3: Ranges; Introduction; Using ranges when implementing an algorithm; Creating an input range; Creating an output range; Creating a higher-order range; Putting a range interface on a collection; Creating an input range over a tree structure…”
Full text (MFA users only)
Electronic eBook -
342
Towards Cognitive Autonomous Networks : Network Management Automation for 5G and Beyond.
Published 2020Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- List of Contributors -- Foreword I -- Foreword II -- Preface -- Chapter 1 The Need for Cognitive Autonomy in Communication Networks -- 1.1 Complexity in Communication Networks -- 1.1.1 The Network as a Graph -- 1.1.2 Planes, Layers, and Cross-Functional Design -- 1.1.3 New Network Technology -- 5G -- 1.1.4 Processes, Algorithms, and Automation -- 1.1.5 Network State Changes and Transitions -- 1.1.6 Multi-RAT Deployments -- 1.2 Cognition in Network Management Automation -- 1.2.1 Business, Service and Network Management Systems…”
Full text (MFA users only)
eBook -
343
Energy storage for sustainable microgrid
Published 2015Table of Contents: “…1.2.4.2 Weighted Least Squares Estimation1.2.4.3 Newton-Raphson Algorithm; 1.3 Microgrid Control Methods; 1.3.1 PQ Control; 1.3.2 V/f Control; 1.3.3 Droop Control; 1.3.3.1 Active Power Control; 1.3.3.2 Voltage Control; 1.4 Control Architectures in Microgrids; 1.4.1 Master-Slave Control; 1.4.2 Peer-to-peer Control; 1.4.3 Hierarchy Control; 1.5 Microgrid Protection; 1.6 Three-Phase Circuit for Grid-Connected DG; 1.6.1 LC Filter; 1.6.2 Isolation Transformer; 1.7 Energy Storage Technology in Renewable Microgrids; 1.7.1 Batteries; 1.7.1.1 Lead-Acid Batteries; 1.7.1.2 Lithium-Ion Batteries.…”
Full text (MFA users only)
Electronic eBook -
344
Contemporary Ergonomics 1998.
Published 1998Table of Contents: “…Development of a questionnaire to measure attitudes towards virtual reality -- Orientation of blind users on the World Wide Web -- F̃lash, splash and crash:̃ Human factors and the implementation of innovative Web technologies -- Determining ergonomic factors in stress from work demands of nurses -- A risk assessment and control cycle approach to managing workplace stress -- Teleworking: Assessing the risks -- Evaluating teleworking -- case study -- Team organisational mental models: an integrative framework for research -- The impact of ITT on virtual team working in the European automotive industry -- The effect of communication processes upon workers and job efficiency -- A case study of job design in a steel plant -- The effects of age and habitual physical activity on the adjustment to nocturnal shiftwork -- Job design for university technicians: work activity and allocation of function -- Allocation of functions and manufacturing job design based on knowledge requirements -- The need to specify cognition within system requirements -- Analysis of complex communication tasks -- Health and safety as the basis for specifying information systems design requirements -- Cognitive algorithms -- Rapid prototyping in foam of 3D anthropometric computer models in functional postures -- The use of high and low level prototyping methods for product user interfaces -- Creative collaboration in engineering design teams -- Pleasure and product semantics -- A survey of usability practice and needs in Europe -- Cultural influence in usability assessment -- Interface display designs based on operator knowledge requirements -- Understanding what makes icons effective: how subjective ratings can inform design -- Representing uncertainty in decision support systems: the state of the art.…”
Full text (MFA users only)
Electronic eBook -
345
Pediatric incontinence : evaluation and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
346
CUDA Application Design and Development.
Published 2011Table of Contents: “…Multiple GPUs -- Explicit Synchronization -- Implicit Synchronization -- The Unified Virtual Address Space -- A Simple Example -- Profiling Results -- Out-of-Order Execution with Multiple Streams -- Tip for Concurrent Kernel Execution on the Same GPU -- Atomic Operations for Implicitly Concurrent Kernels -- Tying Data to Computation -- Manually Partitioning Data -- Mapped Memory -- How Mapped Memory Works -- Summary -- 8 CUDA for All GPU and CPU Applications -- Pathways from CUDA to Multiple Hardware Backends -- The PGI CUDA x86 Compiler -- The PGI CUDA x86 Compiler -- An x86 core as an SM -- The NVIDIA NVCC Compiler -- Ocelot -- Swan -- MCUDA -- Accessing CUDA from Other Languages -- SWIG -- Copperhead -- EXCEL -- MATLAB -- Libraries -- CUBLAS -- CUFFT -- MAGMA -- phiGEMM Library -- CURAND -- Summary -- 9 Mixing CUDA and Rendering -- OpenGL -- GLUT -- Mapping GPU Memory with OpenGL -- Using Primitive Restart for 3D Performance -- Introduction to the Files in the Framework -- The Demo and Perlin Example Kernels -- The Demo Kernel -- The Demo Kernel to Generate a Colored Sinusoidal Surface -- Perlin Noise -- Using the Perlin Noise Kernel to Generate Artificial Terrain -- The simpleGLmain.cpp File -- The simpleVBO.cpp File -- The callbacksVBO.cpp File -- Summary -- 10 CUDA in a Cloud and Cluster Environments -- The Message Passing Interface (MPI) -- The MPI Programming Model -- The MPI Communicator -- MPI Rank -- Master-Slave -- Point-to-Point Basics -- How MPI Communicates -- Bandwidth -- Balance Ratios -- Considerations for Large MPI Runs -- Scalability of the Initial Data Load -- Using MPI to Perform a Calculation -- Check Scalability -- Cloud Computing -- A Code Example -- Data Generation -- Summary -- 11 CUDA for Real Problems -- Working with High-Dimensional Data -- PCA/NLPCA -- Multidimensional Scaling -- K-Means Clustering.…”
Full text (MFA users only)
Electronic eBook -
347
Knowledge mining using intelligent agents
Published 2011Full text (MFA users only)
Electronic eBook -
348
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
349
Human-assisted intelligent computing : modeling, simulations and applications
Published 2023Full text (MFA users only)
Electronic eBook -
350
Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture
Published 2019Table of Contents: “…The Digitalization of Cultural Policies in France 149; Anne BELLON 14.1.…”
Full text (MFA users only)
Electronic eBook -
351
Under surveillance : being watched in modern America
Published 2017Full text (MFA users only)
Electronic eBook -
352
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
353
Theoretical Computer Science : Proceedings of the 10th Italian Conference on ICTCS '07.
Published 2007Full text (MFA users only)
Electronic eBook -
354
Stochastic filtering with applications in finance
Published 2010Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
Full text (MFA users only)
Electronic eBook -
355
Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization
Published 2019Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
Full text (MFA users only)
Electronic eBook -
356
From complexity in the natural sciences to complexity in operation management systems
Published 2019Table of Contents: “…Complexity in perspective -- 1.2.1. Etymology and semantics -- 1.2.2. Methods proposed for dealing with complexity from the Middle Ages to the 17th Century and their current outfalls -- 1.3. …”
Full text (MFA users only)
Electronic eBook -
357
Credit securitizations and derivatives : challenges for the global markets
Published 2013Table of Contents: “…Market Credit Risk Pricing -- Regulation -- Developments in Structured Finance Markets -- Impairments of Asset-Backed Securities and Outstanding Ratings -- Issuance of Asset-backed Securities and Outstanding Volume -- Global CDO Issuance and Outstanding Volume -- PART II CREDIT PORTFOLIO RISK MEASUREMENT -- Mortgage Credit Risk -- Five C's of Credit and Mortgage Credit Risk -- Determinants of Mortgage Default, Loss Given Default and Exposure at Default -- Determinants of Mortgage Default -- Determinants of Mortgage LGD -- Determinants of Mortgage EAD -- Modeling Methods for Default, LGD and EAD -- Model Risk Management -- Credit Portfolio Correlations and Uncertainty -- Introduction -- Gaussian and Semi-Gaussian Single Risk Factor Model -- Individual and Simultaneous Confidence Bounds and Intervals -- Confidence Intervals for Asset Correlations -- Confidence Intervals for Default and Survival Time Correlations -- Confidence Intervals for Default Correlations -- Confidence Intervals for Survival Time Correlations -- Credit Portfolio Correlations with Dynamic Leverage Ratios -- The Hui et al. (2007) Model -- The Method of Images for Constant Coefficients -- The Method of Images for Time-Varying Coefficients -- Modelling Default Correlations in a Two-Firm Model -- Default Correlations -- A Two-Firm Model with Dynamic Leverage Ratios -- Method of Images for Constant Coefficients -- Method of Images for Time-Varying Coefficients -- Alternative Methodologies for General Values -- Numerical Results -- Accuracy -- The Impact of Correlation between Two Firms -- The Impact of Different Credit Quality Paired Firms -- The Impact of Volatilities -- The Impact of Drift Levels -- The Impact of Initial Value of Leverage Ratio Levels -- Impact of Correlation between Firms and Interest Rates -- The Price of Credit-Linked Notes -- A Hierarchical Model of Tail-Dependent Asset Returns -- The Variance Compound Gamma Model -- Multivariate Process for Logarithmic Asset Returns -- Dependence Structure -- Sampling -- Copula Properties -- An Application Example -- Portfolio Setup -- Test Portfolios -- Parameter Setup -- Simulation Results -- Importance Sampling Algorithm -- Conclusions -- Appendix A: The VCG Probability Distribution Function Appendix B: HAC Representation for the VCG Framework -- Monte Carlo Methods for Portfolio Credit Risk -- Modeling Credit Portfolio Losses -- Risk Measures -- Modeling Dependency -- Estimating Risk Measures via Monte Carlo -- Crude Monte Carlo Estimators -- Importance Sampling -- Specific Models -- The Bernoulli Mixture Model -- Factor Models -- Copula Models -- Intensity Models -- An Example Point Process Model -- Appendix A: A Primer on Rare-event Simulation -- Efficiency -- Importance Sampling -- The Choice of g -- Adaptive Importance Sampling -- Importance Sampling for Stochastic Processes -- Credit Portfolio Risk and Diversification -- Introduction -- Model Setup -- Independent Asset Values -- Correlated Asset Values -- Large Portfolio Limit -- Correlated Diffusion -- Correlated GARCH Process -- Applications of the Structural Recovery Rate -- Conclusions -- PART III CREDIT PORTFOLIO RISK SECURITIZATION AND TRANCHING -- Differences in Tranching Methods: Some Results and Implications -- Defining a Tranche -- The Mathematics of Tranching -- PD-based Tranching -- EL-based Tranching -- The EL of a Tranche Necessarily Increases When Either the Attachment Point or the Detachment Point is Decreased -- Upper Bound on Tranche Expected LGD (LGDt) Assumption Given EL-based Tranches -- Skipping of Some Tranches in the EL-based Approach -- Global Structured Finance Rating -- Asset-Backed Securities -- The ABS Structure for the Experiment -- Cash Flow Modeling -- Modeling and Simulating Defaults -- Expected Loss Rating -- Global Sensitivity Analysis -- Elementary Effects -- Variance-based Method -- Global Sensitivity Analysis Results -- Uncertainty Analysis -- Sensitivity Analysis -- Global Rating -- PART IV CREDIT DERIVATIVES -- Analytic Dynamic Factor Copula Model -- Pricing Equations -- One-factor Copula Model -- Multi-period Factor Copula Models -- Calibration -- Dynamic Modeling of Credit Derivatives -- General Model Choice -- Modeling Option Prices -- Modeling Credit Risk -- Portfolio Credit Derivatives -- Modeling Asset Dynamics -- The Market Model -- The Asset-value Model -- Empirical Analysis -- Elementary Data -- Implied Dividends -- Market Dynamics -- Asset Value Model -- Tranche Pricing -- Out-of-time Application -- Pricing and Calibration in Market Models -- Basic notions -- The model -- Modeling Assumptions -- Absence of Arbitrage -- An affine specification -- Pricing -- Calibration -- Calibration Procedure -- Calibration Results -- Appendix A: Computations -- Counterparty Credit Risk and Clearing of Derivatives -- From the Perspective of an Industrial Corporate with a Focus on Commodity Markets -- Credit exposures in commodity business -- Settlement Exposure -- Performance Exposure -- Example of Fixed Price Deal with Performance Exposure -- Example of a Floating Price Deal with Performance Exposure -- General Remarks on Credit Exposure Concepts -- Ex Ante exposure-reducing techniques -- Payment Terms -- Material Adverse Change Clauses -- Master Agreements -- Netting -- Margining -- Close Out Exposure and Threshold -- Ex Ante risk-reducing techniques -- Credit Enhancements in General -- Parent Company Guarantees -- Letters of Credit -- Credit Insurance -- Clearing via a Central Counterparty -- Ex Post risk-reducing techniques -- Factoring -- Novation -- Risk-reducing Trades -- Hedging with CDS -- Hedging with Contingent-CDS -- Hedging with Puts on Equity -- Ex Post work out considerations -- Practical credit risk management and pricing Peculiarities of commodity markets -- Peculiarities of commodity related credit portfolios -- Credit Risk Capital for a commodity related portfolio measured with an extension of CreditMetrics -- CreditRisk+ study: applied to a commodity related credit portfolio -- CDS Industrial Sector Indices, Credit and Liquidity Risk -- The Data -- Methodology and Results -- Preliminary Analysis -- Common Factor Analysis -- Stability of Relations -- Risk Transfer and Pricing of Illiquid Assets with Loan CDS -- Shipping Market -- Loan Credit Default Swaps -- LCDS Pricing -- Modeling LCDS Under the Intensity-based Model -- Valuation Framework for LCDS -- The Structural Approach -- Credit Risk in Shipping Loans -- Valuation of LCDS on Shipping Loans -- Simulation Model -- Numerical Results -- Appendix A: Monte Carlo Parameterization PART V REGULATION -- Regulatory Capital Requirements for Securitizations -- Regulatory Approaches for Securitizations -- Ratings Based Approach (RBA) -- Supervisory Formula Approach (SFA) -- Standardized Approach (SA) -- Post-crisis Revisions to the Basel Framework -- Regulating OTC Derivatives -- The Wall Street Transparency and Accountability Part of the Dodd-Frank Act of 2010 -- Which Derivatives Will Be Affected? …”
Full text (MFA users only)
Electronic eBook -
358
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
359
Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics
Published 2020Table of Contents: “…5.5.2 Survivability, Availability, and Reliability 122 -- 5.6 Sovereignty, Privacy, Security, Interoperability, and Management 123 -- 5.6.1 Data Sovereignty 123 -- 5.6.2 Privacy and Security 123 -- 5.6.3 Heterogeneity and Interoperability 124 -- 5.6.4 Monitoring, Orchestration, and Management 124 -- 5.7 Trade-Offs 125 -- 5.8 Conclusion 126 -- References 126 -- 6 Incentive Schemes for User-Provided Fog Infrastructure 129 /George Iosifidis, Lin Gao, Jianwei Huang, and Leandros Tassiulas -- 6.1 Introduction 129 -- 6.2 Technology and Economic Issues in UPIs 132 -- 6.2.1 Overview of UPI models for Network Connectivity 132 -- 6.2.2 Technical Challenges of Resource Allocation 134 -- 6.2.3 Incentive Issues 135 -- 6.3 Incentive Mechanisms for Autonomous Mobile UPIs 137 -- 6.4 Incentive Mechanisms for Provider-assisted Mobile UPIs 140 -- 6.5 Incentive Mechanisms for Large-Scale Systems 143 -- 6.6 Open Challenges in Mobile UPI Incentive Mechanisms 145 -- 6.6.1 Autonomous Mobile UPIs 145 -- 6.6.1.1 Consensus of the Service Provider 145 -- 6.6.1.2 Dynamic Setting 146 -- 6.6.2 Provider-assisted Mobile UPIs 146 -- 6.6.2.1 Modeling the Users 146 -- 6.6.2.2 Incomplete Market Information 147 -- 6.7 Conclusions 147 -- References 148 -- 7 Fog-Based Service Enablement Architecture 151 /Nanxi Chen, Siobhán Clarke, and Shu Chen -- 7.1 Introduction 151 -- 7.1.1 Objectives and Challenges 152 -- 7.2 Ongoing Effort on FogSEA 153 -- 7.2.1 FogSEA Service Description 156 -- 7.2.2 Semantic Data Dependency Overlay Network 158 -- 7.2.2.1 Creation and Maintenance 159 -- 7.2.2.2 Semantic-Based Service Matchmarking 161 -- 7.3 Early Results 164 -- 7.3.1 Service Composition 165 -- 7.3.1.1 SeDDON Creation in FogSEA 167 -- 7.3.2 Related Work 168 -- 7.3.2.1 Semantic-Based Service Overlays 169 -- 7.3.2.2 Goal-Driven Planning 170 -- 7.3.2.3 Service Discovery 171 -- 7.3.3 Open Issue and Future Work 172 -- References 174 -- 8 Software-Defined Fog Orchestration for IoT Services 179 /Renyu Yang, Zhenyu Wen, David McKee, Tao Lin, Jie Xu, and Peter Garraghan.…”
Full text (MFA users only)
Electronic eBook -
360
Cybersecurity Law, standards and regulations
Published 2020Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
Full text (MFA users only)
Electronic eBook