Search Results - (((((((ant OR kwants) OR wantis) OR markant) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 25
- Data processing 24
- Mathematics 20
- Mathematical optimization 18
- Algorithms 17
- Mathematical models 16
- algorithms 16
- artificial intelligence 14
- Machine learning 13
- Technological innovations 13
- Data mining 12
- Information technology 12
- Computer algorithms 10
- Computer networks 10
- Management 10
- Big data 9
- Artificial Intelligence 8
- Neural networks (Computer science) 8
- Computer programming 7
- Social aspects 7
- Bioinformatics 6
- Computer science 6
- Design and construction 6
- Development 6
- Parallel processing (Electronic computers) 6
- Swarm intelligence 6
- Wireless communication systems 6
- Application software 5
- Computational Biology 5
- Computational biology 5
Search alternatives:
- ant »
- kwants »
- wantis »
- markant »
- cantor »
- share »
-
281
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
282
Frontiers In The Study Of Chaotic Dynamical Systems With Open Problems.
Published 2011Table of Contents: “…Preface; Contents; Chapter 1 Problems with Lorenz's Modeling and the Algorithm of Chaos Doctrine; 1.1. Introduction; 1.2. …”
Full text (MFA users only)
Electronic eBook -
283
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
284
More and different : notes from a thoughtful curmudgeon
Published 2011Full text (MFA users only)
Electronic eBook -
285
Goliath's revenge : how established companies turn the tables on digital disruptors
Published 2019Full text (MFA users only)
Electronic eBook -
286
Banking and finance issues in emerging markets.
Published 2018Full text (MFA users only)
Electronic eBook -
287
Dynamics among nations : the evolution of legitimacy and development in modern states
Published 2013Full text (MFA users only)
Electronic eBook -
288
Teaching primary programming with Scratch : research-informed approaches. Teacher book
Published 2022Full text (MFA users only)
Electronic eBook -
289
Stochastic filtering with applications in finance
Published 2010Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
Full text (MFA users only)
Electronic eBook -
290
Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization
Published 2019Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
Full text (MFA users only)
Electronic eBook -
291
Digital information ecosystems : smart press
Published 2019Table of Contents: “…The problem of revenue sharing between media and social networks; 6.2. The social network eco-system; 6.2.1. …”
Full text (MFA users only)
Electronic eBook -
292
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
293
Credit securitizations and derivatives : challenges for the global markets
Published 2013Table of Contents: “…Market Credit Risk Pricing -- Regulation -- Developments in Structured Finance Markets -- Impairments of Asset-Backed Securities and Outstanding Ratings -- Issuance of Asset-backed Securities and Outstanding Volume -- Global CDO Issuance and Outstanding Volume -- PART II CREDIT PORTFOLIO RISK MEASUREMENT -- Mortgage Credit Risk -- Five C's of Credit and Mortgage Credit Risk -- Determinants of Mortgage Default, Loss Given Default and Exposure at Default -- Determinants of Mortgage Default -- Determinants of Mortgage LGD -- Determinants of Mortgage EAD -- Modeling Methods for Default, LGD and EAD -- Model Risk Management -- Credit Portfolio Correlations and Uncertainty -- Introduction -- Gaussian and Semi-Gaussian Single Risk Factor Model -- Individual and Simultaneous Confidence Bounds and Intervals -- Confidence Intervals for Asset Correlations -- Confidence Intervals for Default and Survival Time Correlations -- Confidence Intervals for Default Correlations -- Confidence Intervals for Survival Time Correlations -- Credit Portfolio Correlations with Dynamic Leverage Ratios -- The Hui et al. (2007) Model -- The Method of Images for Constant Coefficients -- The Method of Images for Time-Varying Coefficients -- Modelling Default Correlations in a Two-Firm Model -- Default Correlations -- A Two-Firm Model with Dynamic Leverage Ratios -- Method of Images for Constant Coefficients -- Method of Images for Time-Varying Coefficients -- Alternative Methodologies for General Values -- Numerical Results -- Accuracy -- The Impact of Correlation between Two Firms -- The Impact of Different Credit Quality Paired Firms -- The Impact of Volatilities -- The Impact of Drift Levels -- The Impact of Initial Value of Leverage Ratio Levels -- Impact of Correlation between Firms and Interest Rates -- The Price of Credit-Linked Notes -- A Hierarchical Model of Tail-Dependent Asset Returns -- The Variance Compound Gamma Model -- Multivariate Process for Logarithmic Asset Returns -- Dependence Structure -- Sampling -- Copula Properties -- An Application Example -- Portfolio Setup -- Test Portfolios -- Parameter Setup -- Simulation Results -- Importance Sampling Algorithm -- Conclusions -- Appendix A: The VCG Probability Distribution Function Appendix B: HAC Representation for the VCG Framework -- Monte Carlo Methods for Portfolio Credit Risk -- Modeling Credit Portfolio Losses -- Risk Measures -- Modeling Dependency -- Estimating Risk Measures via Monte Carlo -- Crude Monte Carlo Estimators -- Importance Sampling -- Specific Models -- The Bernoulli Mixture Model -- Factor Models -- Copula Models -- Intensity Models -- An Example Point Process Model -- Appendix A: A Primer on Rare-event Simulation -- Efficiency -- Importance Sampling -- The Choice of g -- Adaptive Importance Sampling -- Importance Sampling for Stochastic Processes -- Credit Portfolio Risk and Diversification -- Introduction -- Model Setup -- Independent Asset Values -- Correlated Asset Values -- Large Portfolio Limit -- Correlated Diffusion -- Correlated GARCH Process -- Applications of the Structural Recovery Rate -- Conclusions -- PART III CREDIT PORTFOLIO RISK SECURITIZATION AND TRANCHING -- Differences in Tranching Methods: Some Results and Implications -- Defining a Tranche -- The Mathematics of Tranching -- PD-based Tranching -- EL-based Tranching -- The EL of a Tranche Necessarily Increases When Either the Attachment Point or the Detachment Point is Decreased -- Upper Bound on Tranche Expected LGD (LGDt) Assumption Given EL-based Tranches -- Skipping of Some Tranches in the EL-based Approach -- Global Structured Finance Rating -- Asset-Backed Securities -- The ABS Structure for the Experiment -- Cash Flow Modeling -- Modeling and Simulating Defaults -- Expected Loss Rating -- Global Sensitivity Analysis -- Elementary Effects -- Variance-based Method -- Global Sensitivity Analysis Results -- Uncertainty Analysis -- Sensitivity Analysis -- Global Rating -- PART IV CREDIT DERIVATIVES -- Analytic Dynamic Factor Copula Model -- Pricing Equations -- One-factor Copula Model -- Multi-period Factor Copula Models -- Calibration -- Dynamic Modeling of Credit Derivatives -- General Model Choice -- Modeling Option Prices -- Modeling Credit Risk -- Portfolio Credit Derivatives -- Modeling Asset Dynamics -- The Market Model -- The Asset-value Model -- Empirical Analysis -- Elementary Data -- Implied Dividends -- Market Dynamics -- Asset Value Model -- Tranche Pricing -- Out-of-time Application -- Pricing and Calibration in Market Models -- Basic notions -- The model -- Modeling Assumptions -- Absence of Arbitrage -- An affine specification -- Pricing -- Calibration -- Calibration Procedure -- Calibration Results -- Appendix A: Computations -- Counterparty Credit Risk and Clearing of Derivatives -- From the Perspective of an Industrial Corporate with a Focus on Commodity Markets -- Credit exposures in commodity business -- Settlement Exposure -- Performance Exposure -- Example of Fixed Price Deal with Performance Exposure -- Example of a Floating Price Deal with Performance Exposure -- General Remarks on Credit Exposure Concepts -- Ex Ante exposure-reducing techniques -- Payment Terms -- Material Adverse Change Clauses -- Master Agreements -- Netting -- Margining -- Close Out Exposure and Threshold -- Ex Ante risk-reducing techniques -- Credit Enhancements in General -- Parent Company Guarantees -- Letters of Credit -- Credit Insurance -- Clearing via a Central Counterparty -- Ex Post risk-reducing techniques -- Factoring -- Novation -- Risk-reducing Trades -- Hedging with CDS -- Hedging with Contingent-CDS -- Hedging with Puts on Equity -- Ex Post work out considerations -- Practical credit risk management and pricing Peculiarities of commodity markets -- Peculiarities of commodity related credit portfolios -- Credit Risk Capital for a commodity related portfolio measured with an extension of CreditMetrics -- CreditRisk+ study: applied to a commodity related credit portfolio -- CDS Industrial Sector Indices, Credit and Liquidity Risk -- The Data -- Methodology and Results -- Preliminary Analysis -- Common Factor Analysis -- Stability of Relations -- Risk Transfer and Pricing of Illiquid Assets with Loan CDS -- Shipping Market -- Loan Credit Default Swaps -- LCDS Pricing -- Modeling LCDS Under the Intensity-based Model -- Valuation Framework for LCDS -- The Structural Approach -- Credit Risk in Shipping Loans -- Valuation of LCDS on Shipping Loans -- Simulation Model -- Numerical Results -- Appendix A: Monte Carlo Parameterization PART V REGULATION -- Regulatory Capital Requirements for Securitizations -- Regulatory Approaches for Securitizations -- Ratings Based Approach (RBA) -- Supervisory Formula Approach (SFA) -- Standardized Approach (SA) -- Post-crisis Revisions to the Basel Framework -- Regulating OTC Derivatives -- The Wall Street Transparency and Accountability Part of the Dodd-Frank Act of 2010 -- Which Derivatives Will Be Affected? …”
Full text (MFA users only)
Electronic eBook -
294
Advanced security solutions for multimedia
Published 2021Full text (MFA users only)
Electronic eBook -
295
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
Full text (MFA users only)
Electronic eBook -
296
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
297
SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention.
Published 2020Table of Contents: “…6.3.1 Learning of Most-Representative Data Sets -- 6.3.2 Decision-Making Model -- 6.4 EXPERIMENTAL SETUP -- 6.4.1 Choice of Parameters -- 6.4.2 The Candidate Classifiers -- 6.5 RESULTS AND DISCUSSION -- 6.5.1 Integrating GATUD into SDAD -- 6.5.2 Integrating GATUD into the Clustering-based Method -- 6.6 CONCLUSION -- CHAPTER 7 Threshold Password-Authenticated Secret Sharing Protocolss -- 7.1 MOTIVATION -- 7.2 EXISTING SOLUTIONS -- 7.3 DEFINITION OF SECURITY -- 7.4 TPASS PROTOCOLS -- 7.4.1 Protocol-Based on Two-Phase Commitment -- 7.4.2 Protocol Based on Zero-Knowledge Proof -- 7.4.3 Correctness…”
Full text (MFA users only)
Electronic eBook -
298
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
299
Networks-on-chip : from implementations to programming paradigms
Published 2014Table of Contents: “…3.2.1 DVC scheme3.2.2 Congestion avoidance scheme; 3.3 Multiple-port shared buffer with congestion awareness; 3.3.1 DVC scheme among multiple ports; 3.3.2 Congestion avoidance scheme; 3.4 DVC router microarchitecture; 3.4.1 VC control module; 3.4.2 Metric aggregation and congestion avoidance; 3.4.3 VC allocation module; 3.5 HiBB router microarchitecture; 3.5.1 VC control module; 3.5.2 VC allocation and output port allocation; 3.5.3 VC regulation; 3.6 Evaluation; 3.6.1 DVC router evaluation; 3.6.2 HiBB router evaluation; 3.7 Chapter summary; References.…”
Full text (MFA users only)
Electronic eBook -
300