Search Results - (((((((ant OR kind) OR semantic) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 281

    Power and energy systems III : selected, peer reviewed papers from the 2013 3rd International Conference on Power and Energy Systems (ICPES 2013), November 23-24, Bangkok, Thailand

    Published 2014
    Table of Contents: “…Appropriate Electric Energy Conservation Measures for Big Mosques in Riyadh CityBayesian Algorithm Based on Airborne Power Supply System; Study on the Cooling System of Super-Capacitors for Hybrid Electric Vehicle; A Charging Management of Electric Vehicles Based on Campus Survey Data; Back-EMF Position Detection Technology for Brushless DC Motor; Stress State of Turbine Blade Root and Rim Considering Manufacturing Variations; Analysis on a Gas Turbine Sealing Disk Structure and Material Strength; A Kind of Adjustable Electric Heating Pipe Power Electrode Preparation Equipment.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 282

    Aggregating Dialectology, Typology, and Register Analysis : Linguistic Variation in Text and Speech

    Published 2014
    Table of Contents: “…Kretzschmar -- A weakly supervised multivariate approach to the study of language variation / Sascha Diwersy, Stefan Evert, and Stella Neumann -- Semantic weighting mechanisms in scalable lexical sociolectometry / Tom Ruette, Dirk Geeraerts, Yves Peirsman and Dirk Speelman -- Temperature in the word space : Sense exploration of temperature expressions using word-space modelling / Maria Koptjevskaja-Tamm and Magnus Sahlgren -- The perfect map : Investigating the cross-linguistic distribution of TAME categories in a parallel corpus / Östen Dahl -- Explorations into variation across Slavic : Taking a bottom-up approach / Ruprecht von Waldenfels -- Where Alice fell into : Motion events from a parallel corpus / Annemarie Verkerk -- Algorithmic typology and going from known to similar unknown categories within and across languages / Bernhard Wälchli -- Inducing place distinctions of consonants from their distribution in words / Thomas Mayer -- Laws of language and text in quantitative and synergetic linguistics / Reinhard Köhler.…”
    Full text (MFA users only)
    Electronic eBook
  3. 283

    Cognitive Electronic Warfare : An Artificial Intelligence Approach. by Haigh, Karen

    Published 2021
    Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
    Full text (MFA users only)
    Electronic eBook
  4. 284

    Pulmonary arterial hypertension : diagnosis and evidence-based treatment

    Published 2008
    Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
    Full text (MFA users only)
    Electronic eBook
  5. 285

    Code : Collaborative Ownership and the Digital Economy. by Ghosh, Rishab Aiyer

    Table of Contents: “…Oral Traditions, Indigenous Rights, and Valuable Old Knowledge -- 7 From Keeping "Nature's Secrets" to the Institutionalization of "Open Science" -- 8 Benefit Sharing: Experiments in Governance -- 9 Trust among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information -- 10 Cooking-Pot Markets and Balanced Value Flows -- 11 Coase's Penguin, or, Linux and the Nature of the Firm -- 12 Paying for Public Goods -- 13 Fencing Off Ideas: Enclosure and the Disappearance of the Public Domain -- 14 A Renaissance of the Commons: How the New Sciences and Internet are Framing a New Global Identity and Order -- 15 Positive Intellectual Rights and Information Exchanges -- 16 Copyright and Globalization in the Age of Computer Networks -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  6. 286
  7. 287

    Verification of communication protocols in web services : model-checking service compositions by Mukherjee, Anshuman

    Published 2013
    Table of Contents: “…8.2 Overview of the Problem and Solution8.3 Related Work; 8.4 Colored Petri Net Semantics for BPEL; 8.4.1 Component A; 8.4.2 Component B; 8.4.3 Object Model for BPEL Activities; 8.4.4 XML Templates; 8.4.5 Algorithm for Cloning Templates; 8.5 Results; 8.6 Discussion; 8.7 Summary; References; 9 CONCLUSIONS AND OUTLOOK; 9.1 Results; 9.2 Discussion; 9.3 What Could Be Improved?…”
    Full text (MFA users only)
    Electronic eBook
  8. 288

    Mechanisms and games for dynamic spectrum allocation

    Published 2013
    Table of Contents: “…7.3.10 Other equilibrium concepts -- 7.4 Learning equilibria -- 7.4.1 Learning Nash equilibria -- 7.4.2 Learning epsilon-equilibrium -- 7.4.3 Learning coarse correlated equilibrium -- 7.4.4 Learning satisfaction equilibrium -- 7.4.5 Discussion -- 7.5 Conclusion -- References -- II Cognitive radio and sharing of unlicensed spectrum -- 8 Cooperation in cognitiveradio networks: from accessto monitoring -- 8.1 Introduction -- 8.1.1 Cooperation in cognitive radio: mutual benefits and costs -- 8.2 An overview of coalitional game theory -- 8.3 Cooperative spectrum exploration and exploitation -- 8.3.1 Motivation -- 8.3.2 Basic problem -- 8.3.3 Joint sensing and access as a cooperative game -- 8.3.4 Coalition formation algorithm for joint sensing and access -- 8.3.5 Numerical results -- 8.4 Cooperative primary user activity monitoring -- 8.4.1 Motivation -- 8.4.2 Primary user activity monitoring: basic model -- 8.4.3 Cooperative primary user monitoring -- 8.4.4 Numerical results -- 8.5 Summary -- Acknowledgements -- Copyright notice -- References -- 9 Cooperative cognitive radios with diffusion networks -- 9.1 Introduction -- 9.2 Preliminaries -- 9.2.1 Basic tools in convex and matrix analysis -- 9.2.2 Graphs -- 9.3 Distributed spectrum sensing -- 9.4 Iterative consensus-based approaches -- 9.4.1 Average consensus algorithms -- 9.4.2 Acceleration techniques for iterative consensus algorithms -- 9.4.3 Empirical evaluation -- 9.5 Consensus techniques based on CoMAC -- 9.6 Adaptive distributed spectrum sensing based on adaptive subgradient techniques -- 9.6.1 Distributed detection with adaptive filters -- 9.6.2 Set-theoretic adaptive filters for distributed detection -- 9.6.3 Empirical evaluation -- 9.7 Channel probing -- 9.7.1 Introduction -- 9.7.2 Admissibility problem -- 9.7.3 Power and admission control algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  9. 289

    Handbook of power systems. II

    Published 2010
    Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    There's Something about Gödel : The Complete Guide to the Incompleteness Theorem. by Berto, Francesco

    Published 2009
    Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
    Full text (MFA users only)
    eBook
  11. 291

    Randomness through computation : some answers, more questions

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  12. 292

    Three Views of Logic : Mathematics, Philosophy, and Computer Science. by Loveland, Donald W.

    Published 2014
    Table of Contents: “…Proof Theory; 1 Propositional Logic; 1.1 Propositional Logic Semantics; 1.2 Syntax: Deductive Logics; 1.3 The Resolution Formal Logic; 1.4 Handling Arbitrary Propositional Wffs; 2 Predicate Logic; 2.1 First-Order Semantics; 2.2 Resolution for the Predicate Calculus; 2.2.1 Substitution; 2.2.2 The Formal System for Predicate Logic; 2.2.3 Handling Arbitrary Predicate Wffs; 3 An Application: Linear Resolution and Prolog; 3.1 OSL-Resolution; 3.2 Horn Logic; 3.3 Input Resolution and Prolog; Appendix A: The Induction Principle.…”
    Full text (MFA users only)
    Electronic eBook
  13. 293

    R High Performance Programming. by Lim, Aloysius

    Published 2015
    Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
    Full text (MFA users only)
    Electronic eBook
  14. 294

    Big data in medical science and healthcare management : diagnosis, therapy, side effects

    Published 2016
    Table of Contents: “…Autopilot and "doctor algorithm"? -- 1. Intro big data for healthcare? / Peter Langkafel -- 2. …”
    Full text (MFA users only)
    Electronic eBook
  15. 295

    Real-time database systems : architecture and techniques

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  16. 296

    Epistemological Foundations of Mathematical Experience

    Published 1991
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Gradience in grammar : generative perspectives

    Published 2006
    Table of Contents: “…Frisch and Adrienne Stearns -- Intermediate syntactic variants in a dialect : standard speech repertoire and relative acceptability / Leonie Cornips -- Gradedness and optionality in mature and developing grammars / Antonella Sorace -- Decomposing gradience : quantitative versus qualitative distinctions / Matthias Schlesewsky, Ina Bornkessel, and Brian McElree -- Gradient perception of intonation / Caroline Féry and Ruben Stoel -- Prototypicality judgements as inverted perception / Paul Boersma -- Modelling productivity with the gradual learning algorithm : the problem of accidentally exceptionless generalizations / Adam Albright and Bruce Hayes -- Gradedness as relative efficiency in the processing of syntax and semantics / John A. …”
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  19. 299

    Constraint Solving over Multi-valued Logics : Application to Digital Circuits.

    Published 2002
    Table of Contents: “…-- 3.2 Test Generation -- 3.3 TG Modelling Approaches and Algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  20. 300

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater -- 15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.…”
    Full text (MFA users only)
    Electronic eBook