Search Results - (((((((ant OR swantee) OR arts) OR carters) OR cantor) OR anne) OR wkantin) OR anting) algorithms.

  1. 161

    Insect media : an archaeology of animals and technology by Parikka, Jussi, 1976-

    Published 2010
    Table of Contents: “…Introduction: insects in the age of technology -- Nineteenth-century insect technics the uncanny affects of insects -- Genesis of form: insect architecture and swarms -- Technics of nature and temporality: Uexküll's ethology -- Metamorphosis, intensity, and devouring space: elements for an insect game theory -- Intermezzo -- Animal ensembles, robotic affects: bees, milieus, and individuation -- Biomorphs and boids: swarming algorithms -- Sexual selection in the biodigital: teknolust and the weird life of SRAs -- Epilogue insect media as an art of transmutation.…”
    Full text (MFA users only)
    Electronic eBook
  2. 162

    An Eulerian Discontinuous Galerkin Method for the Numerical Simulation of Interfacial Transport. by Kallendorf, Christina

    Published 2017
    Table of Contents: “…List of Figures; Nomenclature; List of Tables; Nomenclature; 1 Introduction; 2 Equations of the Physical Model; 3 State of the Art of Numerical Methods; 4 An Introduction to DG Methods; 5 New Conservation Laws of SurfaceTransport Equations; 6 Exact Solutions to the Interfacial Surfactant Transport Equation; 7 A Narrow Band Method for the Eulerian Approach; 8 The Eulerian DG Algorithm and Numerical Results; 9 Conclusion; A Appendix.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Optimization in polymer processing

    Published 2011
    Table of Contents: “…INTRODUCTION ; 2. STATE-OF-THE-ART ; 3. OPTIMIZATION METHODOLOGY.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  6. 166
  7. 167

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Behavioral formation : volatile design processes & the emergence of a strange specificity by Snooks, Roland

    Published 2021
    Table of Contents: “…Intro -- ACKNOWLEDGMENTS -- PREFACE -- INTRODUCTION -- BEHAVIORAL METHODOLOGIES -- FIBROUS ASSEMBLAGES -- FIBROUS TOWER -- POLYSCALAR TECTONICS -- MULTI-AGENT ALGORITHMS -- AGENTBODIES -- BABIY YAR MEMORIAL -- MANIFOLD SWARMS -- RMIT MACE -- BEHAVIORAL COMPOSITES -- COMPOSITE SWARM -- COMPOSITE WING -- RMIT MEETING PAVILION -- AGENTBODY PROTOTYPES -- NGV PAVILION -- STRIATED POLYMERS -- VOLATILITY -- AGENCY OF STRUCTURE -- STRANGE FEEDBACK -- YEOSU PAVILION -- NATIONAL ART MUSEUM OF CHINA -- STRANGE SPECIFICITY -- PAINTERLY FORMATION -- STIGMERGIC ROBOTICS -- CATALOG OF PROJECTS -- GLOSSARY OF TERMS -- BIBLIOGRAPHY.…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Pattern recognition by Theodoridis, Sergios, 1951-

    Published 2006
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Debates in the digital humanities 2016

    Published 2016
    Table of Contents: “…The Differences Between Digital Humanities and Digital History / Stephen Robertson -- Digital History Perpetual Future Tense / Cameron Blevins -- Collections and/of Data: Art History and the Art Museum in the DH Mode / Matthew Battles and Michael Maizels -- Archaeology, the Digital Humanities, and the "Big Tent" / Ethan Watrall ; Navigating the Global Digital Humanities: Insights from Black Feminism / Roopika Risam. …”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Machine Learning with Core ML : an IOS Developer's Guide to Implementing Machine Learning in Mobile Apps. by Newnham, Joshua

    Published 2018
    Table of Contents: “…Learning algorithms Auto insurance in Sweden; Supported learning algorithms; Considerations ; Summary; Chapter 3: Recognizing Objects in the World; Understanding images; Recognizing objects in the world; Capturing data ; Preprocessing the data; Performing inference ; Summary ; Chapter 4: Emotion Detection with CNNs; Facial expressions; Input data and preprocessing ; Bringing it all together; Summary ; Chapter 5: Locating Objects in the World; Object localization and object detection ; Converting Keras Tiny YOLO to Core ML; Making it easier to find photos; Optimizing with batches; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Function Estimates. by Marron, J. S.

    Published 1986
    Table of Contents: “…Partial spline modelling of the tropopause and other discontinuitiesChoice of smoothing parameter in deconvolution problems -- Regression approximation using projections and isotropic kernels -- Will the art of smoothing ever become a science?…”
    Full text (MFA users only)
    Electronic eBook
  13. 173

    Handbook of foot and ankle orthopedics by Shah, Rajiv

    Published 2016
    Table of Contents: “…-- Plantar heel pain -- Growing with flat feet: childhood to adulthood -- Lucid approach and simplistic management of diabetic foot -- Common foot and ankle infections: diagnosis and management -- Art of arthrodesis in foot and ankle -- Dealing with tendo achilles problems! …”
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Advances in time series forecasting. Volume 2

    Published 2017
    Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Anaphora Resolution. by Mitkov, Ruslan

    Published 2014
    Table of Contents: “…4.1 Early work in anaphora resolution4.2 Student; 4.3 Shrdlu; 4.4 Lunar; 4.5 Hobbs's naïve approach; 4.5.1 The algorithm; 4.5.2 Evaluation of Hobbs' s algorithm; 4.6 The BFP algorithm; 4.7 Carter's shallow processing approach; 4.8 Rich and LuperFoy's distributed architecture; 4.9 Carbonell and Brown's multi-strategy approach; 4.10 Other work; 4.11 Summary; Chapter Five: The present: knowledge-poor and corpus-based approaches in the 1990s and beyond; 5.1 Main trends in recent anaphora resolution research; 5.2 Collocation patterns-based approach; 5.3 Lappin and Leass's algorithm; 5.3.1 Overview.…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Ultrashort Pulse Laser Ablation of Bulk Materials Using Shaped Laser Beams. by Mikhaylov, Dmitriy

    Published 2021
    Table of Contents: “…Intro -- 1 Introduction -- 2 Theoretical principles and state of the art -- 2.1 Ultrashort pulse laser technology for materialprocessing -- 2.2 Laser beam shaping -- 2.3 Liquid crystal on silicon spatial light modulators -- 2.4 Phase retrieval algorithms -- 3 Materials and methods -- 3.1 Processed materials -- 3.2 System components -- 3.3 Characterization methods -- 4 Theoretical calculation of limits for theincrease of volumetric ablation rate -- 4.1 Heat accumulation modeling for spatially shapedbeams -- 4.2 Ideal requirements on laser sources as well as beamshaping and guiding optics…”
    Full text (MFA users only)
    eBook
  17. 177

    Mastering SciPy. by Blanco-Silva, Francisco J.

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  18. 178

    PRINCIPLES OF QUANTUM ARTIFICIAL INTELLIGENCE. by Wichert, Andreas

    Published 2013
    Table of Contents: “…Computation; 2.1 Entscheidungsproblem; 2.1.1 Cantor's diagonal argument; 2.1.2 Reductio ad absurdum; 2.2 Complexity Theory; 2.2.1 Decision problems; 2.2.2 P and NP; 2.3 Church-Turing Thesis; 2.3.1 Church-Turing-Deutsch principle; 2.4 Computers; 2.4.1 Analog computers; 2.4.2 Digital computers; 2.4.3 Von Neumann architecture; 3. …”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Pulmonary arterial hypertension : diagnosis and evidence-based treatment

    Published 2008
    Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Graph Partitioning. by Bichot, Charles-Edmond

    Published 2013
    Table of Contents: “…Hendrickson-Leland coarsening algorithm; 2.3.4. The Heavy Edge Matching (HEM) algorithm; 2.4. …”
    Full text (MFA users only)
    Electronic eBook