Search Results - (((((((ant OR manthe) OR find) OR semantic) OR cantor) OR anne) OR halten) OR rantiing) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 53
- Artificial intelligence 44
- Machine learning 30
- Mathematics 30
- Mathematical models 26
- Data mining 25
- artificial intelligence 23
- Mathematical optimization 21
- algorithms 19
- Algorithms 18
- Computer networks 17
- methods 17
- Computer science 15
- Technological innovations 15
- Artificial Intelligence 14
- Big data 14
- Information technology 14
- Research 14
- Computer algorithms 13
- Management 13
- Bioinformatics 11
- Data Mining 11
- Python (Computer program language) 11
- Signal processing 11
- Digital techniques 10
- Diseases 10
- Image processing 10
- Neural networks (Computer science) 10
- R (Computer program language) 10
- Social aspects 10
Search alternatives:
- ant »
- manthe »
- semantic »
- cantor »
- rantiing »
- find »
- halten »
-
541
Computational methods for physics
Published 2013Table of Contents: “…2.5 Stability of numerical methods2.6 Multi-step methods; Further reading; Problems; Lab problems; 3 Root-finding; 3.1 Physical motivation; 3.2 Finding roots; Further reading; Problems; Lab problems; 4 Partial differential equations; 4.1 Physical motivation; 4.2 Finite difference in one dimension; 4.3 Finite difference in two dimensions; 4.4 Examples; Further reading; Problems; Lab problems; 5 Time-dependent problems; 5.1 Physical motivation; 5.2 Exactly solvable cases; 5.3 Discretization and methods; 5.4 Crank-Nicolson for the Schrodinger equation; Further reading; Problems; Lab problems.…”
Full text (MFA users only)
Electronic eBook -
542
-
543
Complex Analysis and Dynamical Systems VII.
Published 2017Table of Contents: “…The Schwarz function method of finding exact solutions for the Muskat problem…”
Full text (MFA users only)
Electronic eBook -
544
Blockchain Developer's Guide : Develop Smart Applications with Blockchain Technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda.
Published 2018Table of Contents: “…Asymmetric (public-key) cryptographySignatures; Hashing; The avalanche effect; Collisions; Hashing a block; Hashing outside PoW; Summary; Chapter 5: Bitcoin; The history of Bitcoin; Why Bitcoin is volatile; Keys and addresses; Currency units; Vanity addresses; Base58 check encoding; Transactions; Types; Pay-to-Public-Key Hash; Pay-to-Script Hash; Blocks; Genesis block; Bitcoin network; Types of nodes; Full node; Lightweight nodes; Other nodes; Network discovery; Finding peers; DNS seeds; Static IPs; Wallets; Types; Deterministic wallet; Deterministic wallets; HD wallets…”
Full text (MFA users only)
Electronic eBook -
545
Decision Intelligence for Dummies
Published 2022Table of Contents: “…Preventing Wrong Influences from Affecting Decisions -- Bad influences in AI and analytics -- The blame game -- Ugly politics and happy influencers -- Risk Factors in Decision Intelligence -- DI and Hyperautomation -- Part 5 The Part of Tens -- Chapter 17 Ten Steps to Setting Up a Smart Decision -- Check Your Data Source -- Track Your Data Lineage -- Know Your Tools -- Use Automated Visualizations -- Impact = Decision -- Do Reality Checks -- Limit Your Assumptions -- Think Like a Science Teacher -- Solve for Missing Data -- Partial versus incomplete data -- Clues and missing answers -- Take Two Perspectives and Call Me in the Morning -- Chapter 18 Bias In, Bias Out (and Other Pitfalls) -- A Pitfalls Overview -- Relying on Racist Algorithms -- Following a Flawed Model for Repeat Offenders -- Using A Sexist Hiring Algorithm -- Redlining Loans -- Leaning on Irrelevant Information -- Falling Victim to Framing Foibles -- Being Overconfident -- Lulled by Percentages -- Dismissing with Prejudice -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
546
The Oil Spill Recovery Institute : past, present, and future directions
Published 2003Table of Contents: “…STATUS OF NOWCAST/FORECAST MODEL COMPONENTS -- Hydrodynamics Model -- Atmospheric Model -- Oil Spill Trajectory and Fates Model -- Biological Effects Modeling -- SCIENTIFIC SIGNIFICANCE AND IMPORTANCE -- FUTURE DIRECTIONS -- Hydrodynamics and Transport in Oil Spill Model -- Chemistry and Oil-Weathering Algorithms -- Spreading -- Evaporation from (Thicker) Emulsified Oil -- Emulsification -- Dispersed Oil Droplet-SPM Interactions -- Biological Effects -- SUMMARY -- 8 Education and Outreach Activities -- FUTURE DIRECTIONS -- 9 Findings and Recommendations -- STRATEGIC PLANNING -- PROGRAM BALANCE AND RESPONSIVENESS TO MISSION -- MODELING AND REAL-TIME OIL SPILL RESPONSE -- GEOGRAPHIC FOCUS -- PROGRAM OVERSIGHT -- FAIRNESS ISSUES -- ACTIONS NEEDED -- ORGANIZATION AND ADMINISTRATION -- GRANT AWARD POLICIES AND PROCEDURES -- PROGRAM PLANNING -- PREDICTIVE ECOLOGY -- APPLIED TECHNOLOGY -- PROGRAM BALANCE -- MODELING -- EDUCATION AND OUTREACH -- References -- Appendixes -- A Committee Biosketches -- B OSRI Bylaws -- Table of Contents -- Article I. …”
Full text (MFA users only)
Electronic eBook -
547
How to measure anything in cybersecurity risk
Published 2016Full text (MFA users only)
Electronic eBook -
548
Cytopathology of the head and neck : ultrasound guided FNAC
Published 2017Full text (MFA users only)
Electronic eBook -
549
Open science by design : realizing a vision for 21st century research
Published 2018Full text (MFA users only)
Electronic eBook -
550
Qualitative Comparative Analysis : An Introduction To Research Design And Application.
Published 2021Full text (MFA users only)
Electronic eBook -
551
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
552
Theoretical Computer Science : Proceedings of the 10th Italian Conference on ICTCS '07.
Published 2007Full text (MFA users only)
Electronic eBook -
553
ModSecurity 2.5.
Published 2009Table of Contents: “…Performance; A typical HTTP request; A real-world performance test; The core ruleset; Installing the core ruleset; Making sure it works; Performance testing basics; Using httperf; Getting a baseline: Testing without ModSecurity; Response time; Memory usage; CPU usage; ModSecurity without any loaded rules; ModSecurity with the core ruleset loaded; Response time; Memory usage; Finding the bottleneck; Wrapping up core ruleset performance; Optimizing performance; Memory consumption; Bypassing inspection of static content; Using @pm and @pmFromFile; Logging.…”
Full text (MFA users only)
Electronic eBook -
554
WordPress 3 Search Engine Optimization.
Published 2011Table of Contents: “…Earning respect with search enginesLeveraging WordPress' blogging capabilities; Displaying RSS feeds; Finding your RSS feed; Promoting your RSS feed; Automatically creating descriptive URLs with WordPress permalinks; Creating reliable, text-based navigation; Engaging visitors with built-in collaboration, contribution, and community building; Employing user roles to get your team involved; Improving ranking with user comments; Using update services; Understanding what WordPress doesn't do for your SEO; Tackling duplicate content within WordPress.…”
Full text (MFA users only)
Electronic eBook -
555
Advances in geosciences (a 4-volume set) - volume 31 : solid earth science (se).
Published 2012Table of Contents: “…Reviewers; Editors; Preface; Preface to SE Volume; CONTENTS; Metaheuristic Technique for Finding Earthquake Locations in NW Himalayan Region A. …”
Full text (MFA users only)
Electronic eBook -
556
Rapid BeagleBoard prototyping with MATLAB and Simulink
Published 2013Table of Contents: “…Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing BeagleBoard; A quick overview of this book; BeagleBoard-xM; BeagleBoard for rapid prototyping; Summary; Chapter 2: Installing Linux on the BeagleBoard; Setting up the hardware; Compulsory hardware; Required hardware for rapid prototyping in this book; Connecting our components; Installing software and tools on a Windows 7 PC; Target system and host PC system; Finding the COM port for a RS232-USB adapter cable; Configuring the IP address of the host PC.…”
Full text (MFA users only)
Electronic eBook -
557
Limits, Limits Everywhere : the Tools of Mathematical Analysis
Published 2012Table of Contents: “…Bounds for Glory; 5.1 Bounded Sequences Revisited; 5.2 Monotone Sequences; 5.3 An Old Friend Returns; 5.4 Finding Square Roots; 5.5 Exercises for Chapter 5; 6. …”
Full text (MFA users only)
Electronic eBook -
558
More and different : notes from a thoughtful curmudgeon
Published 2011Full text (MFA users only)
Electronic eBook -
559
Advancing commercialization of digital products from federal laboratories
Published 2021Full text (MFA users only)
Electronic eBook -
560