Search Results - (((((((ant OR hwants) OR granting) OR makant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 181
  2. 182

    Artificial intelligent techniques for electric and hybrid electric vehicles

    Published 2020
    Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...

    Published 2012
    Table of Contents: “…A Study on Corrosion Resistance and Weatherability of Fluorocarbon Anti-Corrosion Coatings for External Surface of Ocean PlatformA Study on the Mechanical Properties of Polymer-Ceramic Composite Using Injection Moulding; An Enhanced Resolution Three-Dimensional Transformation Method Based on Discrete Wavelet Transform; An Entropy Based Analytical Model for Thermoelastic Damping in Micromechanical Resonators; An Improved Ant Colony Optimization for Large-Scale Simple Assembly Line Balancing Problem of Type-1…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 184

    Medical data privacy handbook

    Published 2015
    Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Cryptography : protocols, design, and applications

    Published 2012
    Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics by Ahmadian, Amir Sharif

    Published 2016
    Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Automatic Modeling and Fault Diagnosis of Timed Concurrent Discrete Event Systems : Automatische Modellierung und Fehlerdiagnose Zeitlicher Nebenläufiger Ereignisdiskreter Systeme.... by Schneider, Stefan

    Published 2015
    Table of Contents: “…3.3.3 Precision and Completeness Properties3.3.4 Identification Parameters; 3.4 Timed Distributed Modeling; 3.5 Identification of Timed Distributed Models; 3.5.1 Timed Distributed Identification Approach; 3.5.2 Precision and Completeness Properties; 3.5.3 Discussion on Shared I/Os; 3.6 Identification of Timed Distributed BMS Models; 3.6.1 Data Collection; 3.6.2 Timed Distributed Identification; 4 Partitioning of DES Models; 4.1 Preliminaries; 4.2 Causal Partitioning; 4.2.1 Distance and Causality; 4.2.2 Causal Partitioning Algorithm; 4.3 Optimal Partitioning; 4.3.1 Optimization Approach.…”
    Full text (MFA users only)
    Electronic eBook
  8. 188

    Parallel Programming with Python. by Palach, Jan

    Published 2014
    Table of Contents: “…; Exploring common forms of parallelization; Communicating in parallel programming; Understanding shared state; Understanding message passing; Identifying parallel programming problems; Deadlock; Starvation; Race conditions; Discovering Python's parallel programming tools; The Python threading module; The Python multiprocessing module.…”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Knowledge-based Intelligent System. by Jang, Hyejung

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Mechatronic Systems, Mechanics and Materials II : Selected, peer reviewed papers from the Symposium on Mechatronics Systems, Mechanics and Materials 2013, October 9-10, 2013, Jastr...

    Published 2013
    Table of Contents: “…Optimization-Supported Decision-Making in the Marine Game Environment Prediction of the Spatial Orientation of a Ship by Means of Neural Networks; Safe Ship Control Method with the Use of Ant Colony Optimization; Selected Problems of the Asynchronous Drive Control with the Three-Phase Soft-Start System; System Architecture of Mission Planning and Autonomous Surface Vessel Control; The Characteristics of the Matrix Game Sensitivity of the Safe Passing of Ships at Sea; The Comparison of Parameter Identification Methods for Fractional, Partial Differential Equation; III. …”
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Data Science : The Executive Summary - a Technical Book for Non-Technical Professionals. by Cady, Field

    Published 2020
    Table of Contents: “…Chapter 3 Working with Modern Data -- 3.1 Unstructured Data and Passive Collection -- 3.2 Data Types and Sources -- 3.3 Data Formats -- 3.3.1 CSV Files -- 3.3.2 JSON Files -- 3.3.3 XML and HTML -- 3.4 Databases -- 3.4.1 Relational Databases and Document Stores -- 3.4.2 Database Operations -- 3.5 Data Analytics Software Architectures -- 3.5.1 Shared Storage -- 3.5.2 Shared Relational Database -- 3.5.3 Document Store + Analytics RDB -- 3.5.4 Storage + Parallel Processing -- Chapter 4 Telling the Story, Summarizing Data -- 4.1 Choosing What to Measure…”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006

    Published 2006
    Table of Contents: “…Early Diagnosis of Alzheimer's Disease Using a Grid Implementation of Statistical Parametric Mapping AnalysisUsing the Grid to Analyze the Pharmacokinetic Modelling After Contrast Administration in Dynamic MRI; Medical Image Registration Algorithms Assessment: Bronze Standard Application Enactment on Grids Using the MOTEUR Workflow Engine; Ethical, Legal and Privacy Issues on HealthGrids; The Ban on Processing Medical Data in European Law: Consent and Alternative Solutions to Legitimate Processing of Medical Data in HealthGrid.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 193
  14. 194

    Database technology for life sciences and medicine

    Published 2010
    Table of Contents: “…The DIANOVA framework. 4.4. Algorithms for realizing DIANOVA. 4.5. Extensions of DIANOVA. 4.6. …”
    Full text (MFA users only)
    Electronic eBook
  15. 195

    The Oil Spill Recovery Institute : past, present, and future directions

    Published 2003
    Table of Contents: “…STATUS OF NOWCAST/FORECAST MODEL COMPONENTS -- Hydrodynamics Model -- Atmospheric Model -- Oil Spill Trajectory and Fates Model -- Biological Effects Modeling -- SCIENTIFIC SIGNIFICANCE AND IMPORTANCE -- FUTURE DIRECTIONS -- Hydrodynamics and Transport in Oil Spill Model -- Chemistry and Oil-Weathering Algorithms -- Spreading -- Evaporation from (Thicker) Emulsified Oil -- Emulsification -- Dispersed Oil Droplet-SPM Interactions -- Biological Effects -- SUMMARY -- 8 Education and Outreach Activities -- FUTURE DIRECTIONS -- 9 Findings and Recommendations -- STRATEGIC PLANNING -- PROGRAM BALANCE AND RESPONSIVENESS TO MISSION -- MODELING AND REAL-TIME OIL SPILL RESPONSE -- GEOGRAPHIC FOCUS -- PROGRAM OVERSIGHT -- FAIRNESS ISSUES -- ACTIONS NEEDED -- ORGANIZATION AND ADMINISTRATION -- GRANT AWARD POLICIES AND PROCEDURES -- PROGRAM PLANNING -- PREDICTIVE ECOLOGY -- APPLIED TECHNOLOGY -- PROGRAM BALANCE -- MODELING -- EDUCATION AND OUTREACH -- References -- Appendixes -- A Committee Biosketches -- B OSRI Bylaws -- Table of Contents -- Article I. …”
    Full text (MFA users only)
    Electronic eBook
  16. 196
  17. 197

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Better living through economics

    Published 2010
    Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  20. 200

    Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...

    Published 2011
    Table of Contents: “…Application of DNA Genetic Algorithm in Manufacturing System Scheduling OptimizationSoft-Sensor for Estimation of Lead Slices Thickness in Continuous Casting Process; Hydrodynamic Mathematical Modeling of the Yangshan Deep-Water Harbor Waters, China; Multidisciplinary Design Method Taking Traditional Manufacturing Factors into Account; Research on the Seed-Fertilizer Box for a Ridge-Till and No-Till Seeder; Research on the Investment Decision-Making on the Application of Advanced Manufacturing Technologies in Enterprises; Zigbee-Based Data Acquisition System for Manufacturing…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook