Search Results - (((((((ant OR want) OR mantis) OR when) OR ckantor) OR anne) OR shape) OR hints) algorithms.

  1. 541

    Electromagnetic nondestructive evaluation (XII)

    Published 2009
    Table of Contents: “…Elastic Properties of Thermally Aged Fe-Cu Model Alloys Measured by EMAR Method -- Nondestructive Evaluation of Ferromagnetic Structural Materials Using FG Sensor -- Inverse Problem and Imaging -- Standoff Detection and Imaging of Suspicious and Concealed Objects with Electromagnetic Waves in the Centimetre and Millimetre Range -- Pulsed Terahertz Imaging for Nondestructive Evaluation -- On the Imaging of Two-Dimensional Thin Inclusions by a MUSIC-Type Algorithm from Boundary Measurements -- Chance-Constrained Programming: A Tool for Solving Linear Eddy Current Inverse Problem -- A Multiple Frequency Strategy for Reconstruction of Stress Corrosion Crack from ECT Signals -- Estimation Theory Metrics in Electromagnetic NDE -- Three Dimensional Shape Recovery of Fatigue Crack Using Eddy Current Testing Signals -- Application of Electromagnetic Nondestructive Techniques -- Development of Strong Magnetizer and Robust Sensor Mount System to Increase Performance in Detecting Defects on Pipeline -- Electromagnetic Evaluation of Honeycomb Composite Materials -- An Electromagnetic Method for Evaluation of Fatigue and for Detection of Damage at Bjork-Shiley Convexo-Concave Prosthetic Heart Valves -- Electromagnetic Evaluation of Soil Condition -- Investigation of Cu-Pc Thin Films on ITO Substrate by Using a Near-Field Microwave Microprobe -- Noncontact Characterization of Electric Carriers Density at Heterojunction Interfaces -- Electromagnetic Field Interaction with Aqueous Glucose Solution in Dielectric Resonator -- Quantitative Evaluation of Corrosion Shape on Back Surface of SUS Samples by EMAT -- Inspection of 3D Flaws Using EMAT -- Nondestructive Evaluation of Beryllium to Copper Joining for ITER by Using an Electromagnetic Acoustic Transducer (EMAT) -- Subject Index -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 542

    Great Myths of Personality. by Donnellan, M. Brent

    Published 2021
    Table of Contents: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Research methods 101 -- Organization of chapters -- Foundational material -- Biological aspects of personality -- Personality assessment -- Personality development -- Well-being/happiness -- Applications of personality -- Basic vocabulary -- References -- Chapter 1 Situational Factors Overwhelm Personality When Predicting Behavior -- Defining personality -- Personality and assessment -- Responding to personality and assessment -- References…”
    Full text (MFA users only)
    Electronic eBook
  3. 543

    Theory and application of special functions : proceedings of an advanced seminar sponsored by the Mathematics Research Center, the University of Wisconsin-Madison, March 31-April 2...

    Published 1975
    Table of Contents: “…Nonlinear recurrence algorithms for elliptic integrals and elliptic functions; 4. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 544

    Beginning software engineering by Stephens, Rod, 1961-

    Published 2015
    Table of Contents: “…WhatWhen; Where; Why; How; Study Users; Refining Requirements; Copy Existing Systems; Clairvoyance; Brainstorm; Recording Requirements; UML; User Stories; Use Cases; Prototypes; Requirements Specification; Validation and Verification; Changing Requirements; Summary; CHAPTER 5: HIGH-LEVEL DESIGN; The Big Picture; What to Specify; Security; Hardware; User Interface; Internal Interfaces; External Interfaces; Architecture; Monolithic; Client/Server; Component-Based; Service-Oriented; Data-Centric; Event-Driven; Rule-Based; Distributed; Mix and Match; Reports; Other Outputs; Database; Audit Trails.…”
    Full text (MFA users only)
    Electronic eBook
  5. 545

    Securing SQL server : protecting Your database from attackers by Cherry, Denny

    Published 2015
    Table of Contents: “…; Personally Identifiable Information; When should security objectives been identified?; How to identify security objectives?…”
    Full text (MFA users only)
    Electronic eBook
  6. 546

    Intelligent computational systems : a multi-disciplinary perspective

    Published 2017
    Table of Contents: “…3.2.1. Genetic Algorithm (GA) -- 3.2.2. Particle Swarm Optimization Algorithm (PSO) -- 3.3. …”
    Full text (MFA users only)
    Electronic eBook
  7. 547

    Mathematics of evolution and phylogeny

    Published 2005
    Table of Contents: “…List of Contributors -- 1 The minimum evolution distance-based approach of phylogenetic inference -- 1.1 Introduction -- 1.2 Tree metrics -- 1.2.1 Notation and basics -- 1.2.2 Three-point and four-point conditions -- 1.2.3 Linear decomposition into split metrics -- 1.2.4 Topological matrices -- 1.2.5 Unweighted and balanced averages -- 1.2.6 Alternate balanced basis for tree metrics -- 1.2.7 Tree metric inference in phylogenetics -- 1.3 Edge and tree length estimation -- 1.3.1 The LS approach -- 1.3.2 Edge length formulae -- 1.3.3 Tree length formulae -- 1.3.4 The positivity constraint -- 1.3.5 The balanced scheme of Pauplin -- 1.3.6 Semple and Steel combinatorial interpretation -- 1.3.7 BME: a WLS interpretation -- 1.4 The agglomerative approach -- 1.4.1 UPGMA and WPGMA -- 1.4.2 NJ as a balanced minimum evolution algorithm -- 1.4.3 Other agglomerative algorithms -- 1.5 Iterative topology searching and tree building -- 1.5.1 Topology transformations.; 1.5.2 A fast algorithm for NNIs with OLS -- 1.5.3 A fast algorithm for NNIs with BME -- 1.5.4 Iterative tree building with OLS -- 1.5.5 From OLS to BME -- 1.6 Statistical consistency -- 1.6.1 Positive results -- 1.6.2 Negative results -- 1.6.3 Atteson's safety radius analysis -- 1.7 Discussion -- Acknowledgements -- 2 Likelihood calculation in molecular phylogenetics -- 2.1 Introduction -- 2.2 Markov models of sequence evolution -- 2.2.1 Independence of sites -- 2.2.2 Setting up the basic model -- 2.2.3 Stationary distribution -- 2.2.4 Time reversibility -- 2.2.5 Rate of mutation -- 2.2.6 Probability of sequence evolution on a tree -- 2.3 Likelihood calculation: the basic algorithm -- 2.4 Likelihood calculation: improved models -- 2.4.1 Choosing the rate matrix -- 2.4.2 Among site rate variation -- 2.4.3 Site-specific rate variation -- 2.4.4 Correlated evolution between sites -- 2.5 Optimizing parameters -- 2.5.1 Optimizing continuous parameters -- 2.5.2 Searching for the optimal tree.; 2.5.3 Alternative search strategies -- 2.6 Consistency of the likelihood approach -- 2.6.1 Statistical consistency -- 2.6.2 Identifiability of the phylogenetic models -- 2.6.3 Coping with errors in the model -- 2.7 Likelihood ratio tests -- 2.7.1 When to use the asymptotic x2 distribution -- 2.7.2 Testing a subset of real parameters -- 2.7.3 Testing parameters with boundary conditions -- 2.7.4 Testing trees -- 2.8 Concluding remarks -- Acknowledgements -- 3 Bayesian inference in molecular phylogenetics -- 3.1 The likelihood function and maximum likelihood estimates -- 3.2 The Bayesian paradigm -- 3.3 Prior -- 3.4 Markov chain Monte Carlo -- 3.4.1 Metropolis-Hastings algorithm -- 3.4.2 Single-component Metropolis-Hastings algorithm -- 3.4.3 Gibbs sampler -- 3.4.4 Metropolis-coupled MCMC -- 3.5 Simple moves and their proposal ratios -- 3.5.1 Sliding window using uniform proposal -- 3.5.2 Sliding window using normally distributed proposal.; 3.5.3 Sliding window using normal proposal in multidimensions -- 3.5.4 Proportional shrinking and expanding -- 3.6 Monitoring Markov chains and processing output -- 3.6.1 Diagnosing and validating MCMC algorithms -- 3.6.2 Gelman and Rubin's potential scale reduction statistic -- 3.6.3 Processing output -- 3.7 Applications to molecular phylogenetics -- 3.7.1 Estimation of phylogenies -- 3.7.2 Estimation of species divergence times -- 3.8 Conclusions and perspectives -- Acknowledgements -- 4 Statistical approach to tests involving phylogenies -- 4.1 The statistical approach to phylogenetic inference -- 4.2 Hypotheses testing -- 4.2.1 Null and alternative hypotheses -- 4.2.2 Test statistics -- 4.2.3 Significance and power -- 4.2.4 Bayesian hypothesis testing -- 4.2.5 Questions posed as function of the tree parameter -- 4.2.6 Topology of treespace -- 4.2.7 The data -- 4.2.8 Statistical paradigms -- 4.2.9 Distributions on treespace -- 4.3 Different types of tests involving phylogenies.; 4.3.1 Testing t1 versus t2 -- 4.3.2 Conditional tests -- 4.3.3 Modern Bayesian hypothesis testing -- 4.3.4 Bootstrap tests -- 4.4 Non-parametric multivariate hypothesis testing -- 4.4.1 Multivariate con.dence regions -- 4.5 Conclusions: there are many open problems -- Acknowledgements -- 5 Mixture models in phylogenetic inference -- 5.1 Introduction: models of gene-sequence evolution -- 5.2 Mixture models -- 5.3 Defining mixture models -- 5.3.1 Partitioning and mixture models -- 5.3.2 Discrete-gamma model as a mixture model -- 5.3.3 Combining rate and pattern-heterogeneity -- 5.4 Digression: Bayesian phylogenetic inference -- 5.4.1 Bayesian inference of trees via MCMC -- 5.5 A mixture model combining rate and pattern-heterogeneity -- 5.5.1 Selected simulation results -- 5.6 Application of the mixture model to inferring the phylogeny of the mammals -- 5.6.1 Model testing -- 5.7 Results -- 5.7.1 How many rate matrices to include in the mixture model?…”
    Full text (MFA users only)
    Electronic eBook
  8. 548

    Ultra-wideband signals and systems in communication engineering by Ghavami, M.

    Published 2004
    Table of Contents: “…Ultra Wideband Signals and Systems in Communication Engineering; Contents; Preface; Acknowledgments; List of Figures; List of Tables; Introduction; I.1 Ultra wideband overview; I.2 A note on terminology; I.3 Historical development of UWB; I.4 Key benefits of UWB; I.5 UWB and Shannon's theory; I.6 Challenges for ultra wideband; I.7 Summary; 1 Basic properties of UWB signals and systems; 1.1 Introduction; 1.2 Power spectral density; 1.3 Pulse shape; 1.4 Pulse trains; 1.5 Spectral masks; 1.6 Multipath; 1.7 Penetration characteristics; 1.8 Spatial and spectral capacities…”
    Full text (MFA users only)
    Electronic eBook
  9. 549
  10. 550
  11. 551

    Biological computation by Lamm, Ehud

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  12. 552

    Minor Surgery at a Glance. by Mohan, Helen

    Published 2017
    Table of Contents: “…Part 3 Core surgical knowledge -- 17 Skin incisions -- Scalpels -- Holding the scalpel to make an incision -- Basic principles for incision -- Minor surgical incisions -- Techniques for a good scar -- Electrodissection to incise -- 18 Principles of wound closure -- Plan the skin incision -- Choosing the suture size -- Choosing the suture material -- Suture placement -- Technique for simple interrupted sutures -- When should I use a different suturing technique? …”
    Full text (MFA users only)
    Electronic eBook
  13. 553

    The SMART CYBER ECOSYSTEM FOR SUSTAINABLE DEVELOPMENT.

    Published 2021
    Full text (MFA users only)
    Electronic eBook
  14. 554

    A primer on experiments with mixtures by Cornell, John A., 1941-

    Published 2011
    Table of Contents: “…QuestionsAppendix 2A: Least-Squares Estimation Formula for the Polynomial Coefficients and Their Variances: Matrix Notation; Appendix 2B: Cubic and Quartic Polynomials and Formulas for the Estimates of the Coefficients; Appendix 2C: The Partitioning of the Sources in the Analysis of Variance Table When Fitting the Scheffé Mixture Models; 3. Multiple Constraints on the Component Proportions; 3.1 Lower-Bound Restrictions on Some or All of the Component Proportions; 3.2 Introducing L-Pseudocomponents; 3.3 A Numerical Example of Fitting An L-Pseudocomponent Model.…”
    Full text (MFA users only)
    Electronic eBook
  15. 555

    Missing Data Methods : Cross-Sectional Methods and Applications. by Drukker, David M.

    Published 2011
    Table of Contents: “…NotesAcknowledgment; References; Orthogonality in the single index model; On the estimation of selection models when participation is endogenous and misclassified; Introduction; The model and estimator; Sampling algorithm; Simulated data example; Summary and conclusions; Notes; Acknowledgments; References; summary tables for additional simulations; Process for simulating non -- normal errors; Efficient probit estimation with partially missing covariates; Introduction; Model Specification; Efficient estimators and variances; Testing assumptions and possible modifications; Other models.…”
    Full text (MFA users only)
    Electronic eBook
  16. 556

    Moments, Positive Polynomials And Their Applications.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  17. 557

    Model Building in Mathematical Programming. by Williams, H. Paul

    Published 2013
    Table of Contents: “…9.4 Extra conditions applied to linear programming models -- 9.5 Special kinds of integer programming model -- 9.6 Column generation -- Chapter 10: Building integer programming models II -- 10.1 Good and bad formulations -- 10.2 Simplifying an integer programming model -- 10.3 Economic information obtainable by integer programming -- 10.4 Sensitivity analysis and the stability of a model -- 10.5 When and how to use integer programming -- Chapter 11: The implementation of a mathematical programming system of planning -- 11.1 Acceptance and implementation…”
    Full text (MFA users only)
    Electronic eBook
  18. 558

    Pharmacology in anesthesia practice

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  19. 559

    High performance parallelism pearls : multicore and many-core programming approaches by Reinders, James, Jeffers, Jim (Computer engineer)

    Published 2015
    Table of Contents: “…; The Hyper-Thread Phalanx hand-partitioning technique; A lesson learned; Back to work; Data alignment; Use aligned data when possible; Redundancy can be good for you; The plesiochronous phasing barrier; Let us do something to recover this wasted time; A few "left to the reader" possibilities.…”
    Full text (MFA users only)
    Electronic eBook
  20. 560

    Credit securitizations and derivatives : challenges for the global markets

    Published 2013
    Table of Contents: “…Market Credit Risk Pricing -- Regulation -- Developments in Structured Finance Markets -- Impairments of Asset-Backed Securities and Outstanding Ratings -- Issuance of Asset-backed Securities and Outstanding Volume -- Global CDO Issuance and Outstanding Volume -- PART II CREDIT PORTFOLIO RISK MEASUREMENT -- Mortgage Credit Risk -- Five C's of Credit and Mortgage Credit Risk -- Determinants of Mortgage Default, Loss Given Default and Exposure at Default -- Determinants of Mortgage Default -- Determinants of Mortgage LGD -- Determinants of Mortgage EAD -- Modeling Methods for Default, LGD and EAD -- Model Risk Management -- Credit Portfolio Correlations and Uncertainty -- Introduction -- Gaussian and Semi-Gaussian Single Risk Factor Model -- Individual and Simultaneous Confidence Bounds and Intervals -- Confidence Intervals for Asset Correlations -- Confidence Intervals for Default and Survival Time Correlations -- Confidence Intervals for Default Correlations -- Confidence Intervals for Survival Time Correlations -- Credit Portfolio Correlations with Dynamic Leverage Ratios -- The Hui et al. (2007) Model -- The Method of Images for Constant Coefficients -- The Method of Images for Time-Varying Coefficients -- Modelling Default Correlations in a Two-Firm Model -- Default Correlations -- A Two-Firm Model with Dynamic Leverage Ratios -- Method of Images for Constant Coefficients -- Method of Images for Time-Varying Coefficients -- Alternative Methodologies for General Values -- Numerical Results -- Accuracy -- The Impact of Correlation between Two Firms -- The Impact of Different Credit Quality Paired Firms -- The Impact of Volatilities -- The Impact of Drift Levels -- The Impact of Initial Value of Leverage Ratio Levels -- Impact of Correlation between Firms and Interest Rates -- The Price of Credit-Linked Notes -- A Hierarchical Model of Tail-Dependent Asset Returns -- The Variance Compound Gamma Model -- Multivariate Process for Logarithmic Asset Returns -- Dependence Structure -- Sampling -- Copula Properties -- An Application Example -- Portfolio Setup -- Test Portfolios -- Parameter Setup -- Simulation Results -- Importance Sampling Algorithm -- Conclusions -- Appendix A: The VCG Probability Distribution Function Appendix B: HAC Representation for the VCG Framework -- Monte Carlo Methods for Portfolio Credit Risk -- Modeling Credit Portfolio Losses -- Risk Measures -- Modeling Dependency -- Estimating Risk Measures via Monte Carlo -- Crude Monte Carlo Estimators -- Importance Sampling -- Specific Models -- The Bernoulli Mixture Model -- Factor Models -- Copula Models -- Intensity Models -- An Example Point Process Model -- Appendix A: A Primer on Rare-event Simulation -- Efficiency -- Importance Sampling -- The Choice of g -- Adaptive Importance Sampling -- Importance Sampling for Stochastic Processes -- Credit Portfolio Risk and Diversification -- Introduction -- Model Setup -- Independent Asset Values -- Correlated Asset Values -- Large Portfolio Limit -- Correlated Diffusion -- Correlated GARCH Process -- Applications of the Structural Recovery Rate -- Conclusions -- PART III CREDIT PORTFOLIO RISK SECURITIZATION AND TRANCHING -- Differences in Tranching Methods: Some Results and Implications -- Defining a Tranche -- The Mathematics of Tranching -- PD-based Tranching -- EL-based Tranching -- The EL of a Tranche Necessarily Increases When Either the Attachment Point or the Detachment Point is Decreased -- Upper Bound on Tranche Expected LGD (LGDt) Assumption Given EL-based Tranches -- Skipping of Some Tranches in the EL-based Approach -- Global Structured Finance Rating -- Asset-Backed Securities -- The ABS Structure for the Experiment -- Cash Flow Modeling -- Modeling and Simulating Defaults -- Expected Loss Rating -- Global Sensitivity Analysis -- Elementary Effects -- Variance-based Method -- Global Sensitivity Analysis Results -- Uncertainty Analysis -- Sensitivity Analysis -- Global Rating -- PART IV CREDIT DERIVATIVES -- Analytic Dynamic Factor Copula Model -- Pricing Equations -- One-factor Copula Model -- Multi-period Factor Copula Models -- Calibration -- Dynamic Modeling of Credit Derivatives -- General Model Choice -- Modeling Option Prices -- Modeling Credit Risk -- Portfolio Credit Derivatives -- Modeling Asset Dynamics -- The Market Model -- The Asset-value Model -- Empirical Analysis -- Elementary Data -- Implied Dividends -- Market Dynamics -- Asset Value Model -- Tranche Pricing -- Out-of-time Application -- Pricing and Calibration in Market Models -- Basic notions -- The model -- Modeling Assumptions -- Absence of Arbitrage -- An affine specification -- Pricing -- Calibration -- Calibration Procedure -- Calibration Results -- Appendix A: Computations -- Counterparty Credit Risk and Clearing of Derivatives -- From the Perspective of an Industrial Corporate with a Focus on Commodity Markets -- Credit exposures in commodity business -- Settlement Exposure -- Performance Exposure -- Example of Fixed Price Deal with Performance Exposure -- Example of a Floating Price Deal with Performance Exposure -- General Remarks on Credit Exposure Concepts -- Ex Ante exposure-reducing techniques -- Payment Terms -- Material Adverse Change Clauses -- Master Agreements -- Netting -- Margining -- Close Out Exposure and Threshold -- Ex Ante risk-reducing techniques -- Credit Enhancements in General -- Parent Company Guarantees -- Letters of Credit -- Credit Insurance -- Clearing via a Central Counterparty -- Ex Post risk-reducing techniques -- Factoring -- Novation -- Risk-reducing Trades -- Hedging with CDS -- Hedging with Contingent-CDS -- Hedging with Puts on Equity -- Ex Post work out considerations -- Practical credit risk management and pricing Peculiarities of commodity markets -- Peculiarities of commodity related credit portfolios -- Credit Risk Capital for a commodity related portfolio measured with an extension of CreditMetrics -- CreditRisk+ study: applied to a commodity related credit portfolio -- CDS Industrial Sector Indices, Credit and Liquidity Risk -- The Data -- Methodology and Results -- Preliminary Analysis -- Common Factor Analysis -- Stability of Relations -- Risk Transfer and Pricing of Illiquid Assets with Loan CDS -- Shipping Market -- Loan Credit Default Swaps -- LCDS Pricing -- Modeling LCDS Under the Intensity-based Model -- Valuation Framework for LCDS -- The Structural Approach -- Credit Risk in Shipping Loans -- Valuation of LCDS on Shipping Loans -- Simulation Model -- Numerical Results -- Appendix A: Monte Carlo Parameterization PART V REGULATION -- Regulatory Capital Requirements for Securitizations -- Regulatory Approaches for Securitizations -- Ratings Based Approach (RBA) -- Supervisory Formula Approach (SFA) -- Standardized Approach (SA) -- Post-crisis Revisions to the Basel Framework -- Regulating OTC Derivatives -- The Wall Street Transparency and Accountability Part of the Dodd-Frank Act of 2010 -- Which Derivatives Will Be Affected? …”
    Full text (MFA users only)
    Electronic eBook