Search Results - (((((((ant OR want) OR mantis) OR when) OR ckantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 52
- Artificial intelligence 44
- Mathematical models 38
- Mathematics 38
- Machine learning 34
- Mathematical optimization 27
- artificial intelligence 27
- Algorithms 26
- algorithms 23
- Data mining 22
- Social aspects 19
- Artificial Intelligence 18
- Computer networks 18
- Technological innovations 18
- methods 17
- History 16
- Python (Computer program language) 16
- Application software 14
- Computer algorithms 14
- Development 14
- Digital techniques 13
- Statistical methods 13
- Data Mining 12
- Image processing 12
- Information technology 12
- Neural networks (Computer science) 12
- Research 12
- Big data 11
- Design and construction 11
- Automation 10
Search alternatives:
-
541
Electromagnetic nondestructive evaluation (XII)
Published 2009Table of Contents: “…Elastic Properties of Thermally Aged Fe-Cu Model Alloys Measured by EMAR Method -- Nondestructive Evaluation of Ferromagnetic Structural Materials Using FG Sensor -- Inverse Problem and Imaging -- Standoff Detection and Imaging of Suspicious and Concealed Objects with Electromagnetic Waves in the Centimetre and Millimetre Range -- Pulsed Terahertz Imaging for Nondestructive Evaluation -- On the Imaging of Two-Dimensional Thin Inclusions by a MUSIC-Type Algorithm from Boundary Measurements -- Chance-Constrained Programming: A Tool for Solving Linear Eddy Current Inverse Problem -- A Multiple Frequency Strategy for Reconstruction of Stress Corrosion Crack from ECT Signals -- Estimation Theory Metrics in Electromagnetic NDE -- Three Dimensional Shape Recovery of Fatigue Crack Using Eddy Current Testing Signals -- Application of Electromagnetic Nondestructive Techniques -- Development of Strong Magnetizer and Robust Sensor Mount System to Increase Performance in Detecting Defects on Pipeline -- Electromagnetic Evaluation of Honeycomb Composite Materials -- An Electromagnetic Method for Evaluation of Fatigue and for Detection of Damage at Bjork-Shiley Convexo-Concave Prosthetic Heart Valves -- Electromagnetic Evaluation of Soil Condition -- Investigation of Cu-Pc Thin Films on ITO Substrate by Using a Near-Field Microwave Microprobe -- Noncontact Characterization of Electric Carriers Density at Heterojunction Interfaces -- Electromagnetic Field Interaction with Aqueous Glucose Solution in Dielectric Resonator -- Quantitative Evaluation of Corrosion Shape on Back Surface of SUS Samples by EMAT -- Inspection of 3D Flaws Using EMAT -- Nondestructive Evaluation of Beryllium to Copper Joining for ITER by Using an Electromagnetic Acoustic Transducer (EMAT) -- Subject Index -- Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
542
Great Myths of Personality.
Published 2021Table of Contents: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Research methods 101 -- Organization of chapters -- Foundational material -- Biological aspects of personality -- Personality assessment -- Personality development -- Well-being/happiness -- Applications of personality -- Basic vocabulary -- References -- Chapter 1 Situational Factors Overwhelm Personality When Predicting Behavior -- Defining personality -- Personality and assessment -- Responding to personality and assessment -- References…”
Full text (MFA users only)
Electronic eBook -
543
Theory and application of special functions : proceedings of an advanced seminar sponsored by the Mathematics Research Center, the University of Wisconsin-Madison, March 31-April 2...
Published 1975Table of Contents: “…Nonlinear recurrence algorithms for elliptic integrals and elliptic functions; 4. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
544
Beginning software engineering
Published 2015Table of Contents: “…WhatWhen; Where; Why; How; Study Users; Refining Requirements; Copy Existing Systems; Clairvoyance; Brainstorm; Recording Requirements; UML; User Stories; Use Cases; Prototypes; Requirements Specification; Validation and Verification; Changing Requirements; Summary; CHAPTER 5: HIGH-LEVEL DESIGN; The Big Picture; What to Specify; Security; Hardware; User Interface; Internal Interfaces; External Interfaces; Architecture; Monolithic; Client/Server; Component-Based; Service-Oriented; Data-Centric; Event-Driven; Rule-Based; Distributed; Mix and Match; Reports; Other Outputs; Database; Audit Trails.…”
Full text (MFA users only)
Electronic eBook -
545
Securing SQL server : protecting Your database from attackers
Published 2015Table of Contents: “…; Personally Identifiable Information; When should security objectives been identified?; How to identify security objectives?…”
Full text (MFA users only)
Electronic eBook -
546
Intelligent computational systems : a multi-disciplinary perspective
Published 2017Table of Contents: “…3.2.1. Genetic Algorithm (GA) -- 3.2.2. Particle Swarm Optimization Algorithm (PSO) -- 3.3. …”
Full text (MFA users only)
Electronic eBook -
547
Mathematics of evolution and phylogeny
Published 2005Table of Contents: “…List of Contributors -- 1 The minimum evolution distance-based approach of phylogenetic inference -- 1.1 Introduction -- 1.2 Tree metrics -- 1.2.1 Notation and basics -- 1.2.2 Three-point and four-point conditions -- 1.2.3 Linear decomposition into split metrics -- 1.2.4 Topological matrices -- 1.2.5 Unweighted and balanced averages -- 1.2.6 Alternate balanced basis for tree metrics -- 1.2.7 Tree metric inference in phylogenetics -- 1.3 Edge and tree length estimation -- 1.3.1 The LS approach -- 1.3.2 Edge length formulae -- 1.3.3 Tree length formulae -- 1.3.4 The positivity constraint -- 1.3.5 The balanced scheme of Pauplin -- 1.3.6 Semple and Steel combinatorial interpretation -- 1.3.7 BME: a WLS interpretation -- 1.4 The agglomerative approach -- 1.4.1 UPGMA and WPGMA -- 1.4.2 NJ as a balanced minimum evolution algorithm -- 1.4.3 Other agglomerative algorithms -- 1.5 Iterative topology searching and tree building -- 1.5.1 Topology transformations.; 1.5.2 A fast algorithm for NNIs with OLS -- 1.5.3 A fast algorithm for NNIs with BME -- 1.5.4 Iterative tree building with OLS -- 1.5.5 From OLS to BME -- 1.6 Statistical consistency -- 1.6.1 Positive results -- 1.6.2 Negative results -- 1.6.3 Atteson's safety radius analysis -- 1.7 Discussion -- Acknowledgements -- 2 Likelihood calculation in molecular phylogenetics -- 2.1 Introduction -- 2.2 Markov models of sequence evolution -- 2.2.1 Independence of sites -- 2.2.2 Setting up the basic model -- 2.2.3 Stationary distribution -- 2.2.4 Time reversibility -- 2.2.5 Rate of mutation -- 2.2.6 Probability of sequence evolution on a tree -- 2.3 Likelihood calculation: the basic algorithm -- 2.4 Likelihood calculation: improved models -- 2.4.1 Choosing the rate matrix -- 2.4.2 Among site rate variation -- 2.4.3 Site-specific rate variation -- 2.4.4 Correlated evolution between sites -- 2.5 Optimizing parameters -- 2.5.1 Optimizing continuous parameters -- 2.5.2 Searching for the optimal tree.; 2.5.3 Alternative search strategies -- 2.6 Consistency of the likelihood approach -- 2.6.1 Statistical consistency -- 2.6.2 Identifiability of the phylogenetic models -- 2.6.3 Coping with errors in the model -- 2.7 Likelihood ratio tests -- 2.7.1 When to use the asymptotic x2 distribution -- 2.7.2 Testing a subset of real parameters -- 2.7.3 Testing parameters with boundary conditions -- 2.7.4 Testing trees -- 2.8 Concluding remarks -- Acknowledgements -- 3 Bayesian inference in molecular phylogenetics -- 3.1 The likelihood function and maximum likelihood estimates -- 3.2 The Bayesian paradigm -- 3.3 Prior -- 3.4 Markov chain Monte Carlo -- 3.4.1 Metropolis-Hastings algorithm -- 3.4.2 Single-component Metropolis-Hastings algorithm -- 3.4.3 Gibbs sampler -- 3.4.4 Metropolis-coupled MCMC -- 3.5 Simple moves and their proposal ratios -- 3.5.1 Sliding window using uniform proposal -- 3.5.2 Sliding window using normally distributed proposal.; 3.5.3 Sliding window using normal proposal in multidimensions -- 3.5.4 Proportional shrinking and expanding -- 3.6 Monitoring Markov chains and processing output -- 3.6.1 Diagnosing and validating MCMC algorithms -- 3.6.2 Gelman and Rubin's potential scale reduction statistic -- 3.6.3 Processing output -- 3.7 Applications to molecular phylogenetics -- 3.7.1 Estimation of phylogenies -- 3.7.2 Estimation of species divergence times -- 3.8 Conclusions and perspectives -- Acknowledgements -- 4 Statistical approach to tests involving phylogenies -- 4.1 The statistical approach to phylogenetic inference -- 4.2 Hypotheses testing -- 4.2.1 Null and alternative hypotheses -- 4.2.2 Test statistics -- 4.2.3 Significance and power -- 4.2.4 Bayesian hypothesis testing -- 4.2.5 Questions posed as function of the tree parameter -- 4.2.6 Topology of treespace -- 4.2.7 The data -- 4.2.8 Statistical paradigms -- 4.2.9 Distributions on treespace -- 4.3 Different types of tests involving phylogenies.; 4.3.1 Testing t1 versus t2 -- 4.3.2 Conditional tests -- 4.3.3 Modern Bayesian hypothesis testing -- 4.3.4 Bootstrap tests -- 4.4 Non-parametric multivariate hypothesis testing -- 4.4.1 Multivariate con.dence regions -- 4.5 Conclusions: there are many open problems -- Acknowledgements -- 5 Mixture models in phylogenetic inference -- 5.1 Introduction: models of gene-sequence evolution -- 5.2 Mixture models -- 5.3 Defining mixture models -- 5.3.1 Partitioning and mixture models -- 5.3.2 Discrete-gamma model as a mixture model -- 5.3.3 Combining rate and pattern-heterogeneity -- 5.4 Digression: Bayesian phylogenetic inference -- 5.4.1 Bayesian inference of trees via MCMC -- 5.5 A mixture model combining rate and pattern-heterogeneity -- 5.5.1 Selected simulation results -- 5.6 Application of the mixture model to inferring the phylogeny of the mammals -- 5.6.1 Model testing -- 5.7 Results -- 5.7.1 How many rate matrices to include in the mixture model?…”
Full text (MFA users only)
Electronic eBook -
548
Ultra-wideband signals and systems in communication engineering
Published 2004Table of Contents: “…Ultra Wideband Signals and Systems in Communication Engineering; Contents; Preface; Acknowledgments; List of Figures; List of Tables; Introduction; I.1 Ultra wideband overview; I.2 A note on terminology; I.3 Historical development of UWB; I.4 Key benefits of UWB; I.5 UWB and Shannon's theory; I.6 Challenges for ultra wideband; I.7 Summary; 1 Basic properties of UWB signals and systems; 1.1 Introduction; 1.2 Power spectral density; 1.3 Pulse shape; 1.4 Pulse trains; 1.5 Spectral masks; 1.6 Multipath; 1.7 Penetration characteristics; 1.8 Spatial and spectral capacities…”
Full text (MFA users only)
Electronic eBook -
549
Frontiers of manufacturing science and measuring technology IV : selected, peer reviewed papers from the 2014 4th International Conference on Frontiers of Manufacturing Science and...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
550
Chemical engineering and material properties III : selected, peer reviewed papers from the 2014 4th International Symposium on Chemical Engineering and Material Properties (ISCEMP...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
551
-
552
Minor Surgery at a Glance.
Published 2017Table of Contents: “…Part 3 Core surgical knowledge -- 17 Skin incisions -- Scalpels -- Holding the scalpel to make an incision -- Basic principles for incision -- Minor surgical incisions -- Techniques for a good scar -- Electrodissection to incise -- 18 Principles of wound closure -- Plan the skin incision -- Choosing the suture size -- Choosing the suture material -- Suture placement -- Technique for simple interrupted sutures -- When should I use a different suturing technique? …”
Full text (MFA users only)
Electronic eBook -
553
The SMART CYBER ECOSYSTEM FOR SUSTAINABLE DEVELOPMENT.
Published 2021Full text (MFA users only)
Electronic eBook -
554
A primer on experiments with mixtures
Published 2011Table of Contents: “…QuestionsAppendix 2A: Least-Squares Estimation Formula for the Polynomial Coefficients and Their Variances: Matrix Notation; Appendix 2B: Cubic and Quartic Polynomials and Formulas for the Estimates of the Coefficients; Appendix 2C: The Partitioning of the Sources in the Analysis of Variance Table When Fitting the Scheffé Mixture Models; 3. Multiple Constraints on the Component Proportions; 3.1 Lower-Bound Restrictions on Some or All of the Component Proportions; 3.2 Introducing L-Pseudocomponents; 3.3 A Numerical Example of Fitting An L-Pseudocomponent Model.…”
Full text (MFA users only)
Electronic eBook -
555
Missing Data Methods : Cross-Sectional Methods and Applications.
Published 2011Table of Contents: “…NotesAcknowledgment; References; Orthogonality in the single index model; On the estimation of selection models when participation is endogenous and misclassified; Introduction; The model and estimator; Sampling algorithm; Simulated data example; Summary and conclusions; Notes; Acknowledgments; References; summary tables for additional simulations; Process for simulating non -- normal errors; Efficient probit estimation with partially missing covariates; Introduction; Model Specification; Efficient estimators and variances; Testing assumptions and possible modifications; Other models.…”
Full text (MFA users only)
Electronic eBook -
556
Moments, Positive Polynomials And Their Applications.
Published 2009Full text (MFA users only)
Electronic eBook -
557
Model Building in Mathematical Programming.
Published 2013Table of Contents: “…9.4 Extra conditions applied to linear programming models -- 9.5 Special kinds of integer programming model -- 9.6 Column generation -- Chapter 10: Building integer programming models II -- 10.1 Good and bad formulations -- 10.2 Simplifying an integer programming model -- 10.3 Economic information obtainable by integer programming -- 10.4 Sensitivity analysis and the stability of a model -- 10.5 When and how to use integer programming -- Chapter 11: The implementation of a mathematical programming system of planning -- 11.1 Acceptance and implementation…”
Full text (MFA users only)
Electronic eBook -
558
-
559
High performance parallelism pearls : multicore and many-core programming approaches
Published 2015Table of Contents: “…; The Hyper-Thread Phalanx hand-partitioning technique; A lesson learned; Back to work; Data alignment; Use aligned data when possible; Redundancy can be good for you; The plesiochronous phasing barrier; Let us do something to recover this wasted time; A few "left to the reader" possibilities.…”
Full text (MFA users only)
Electronic eBook -
560
Credit securitizations and derivatives : challenges for the global markets
Published 2013Table of Contents: “…Market Credit Risk Pricing -- Regulation -- Developments in Structured Finance Markets -- Impairments of Asset-Backed Securities and Outstanding Ratings -- Issuance of Asset-backed Securities and Outstanding Volume -- Global CDO Issuance and Outstanding Volume -- PART II CREDIT PORTFOLIO RISK MEASUREMENT -- Mortgage Credit Risk -- Five C's of Credit and Mortgage Credit Risk -- Determinants of Mortgage Default, Loss Given Default and Exposure at Default -- Determinants of Mortgage Default -- Determinants of Mortgage LGD -- Determinants of Mortgage EAD -- Modeling Methods for Default, LGD and EAD -- Model Risk Management -- Credit Portfolio Correlations and Uncertainty -- Introduction -- Gaussian and Semi-Gaussian Single Risk Factor Model -- Individual and Simultaneous Confidence Bounds and Intervals -- Confidence Intervals for Asset Correlations -- Confidence Intervals for Default and Survival Time Correlations -- Confidence Intervals for Default Correlations -- Confidence Intervals for Survival Time Correlations -- Credit Portfolio Correlations with Dynamic Leverage Ratios -- The Hui et al. (2007) Model -- The Method of Images for Constant Coefficients -- The Method of Images for Time-Varying Coefficients -- Modelling Default Correlations in a Two-Firm Model -- Default Correlations -- A Two-Firm Model with Dynamic Leverage Ratios -- Method of Images for Constant Coefficients -- Method of Images for Time-Varying Coefficients -- Alternative Methodologies for General Values -- Numerical Results -- Accuracy -- The Impact of Correlation between Two Firms -- The Impact of Different Credit Quality Paired Firms -- The Impact of Volatilities -- The Impact of Drift Levels -- The Impact of Initial Value of Leverage Ratio Levels -- Impact of Correlation between Firms and Interest Rates -- The Price of Credit-Linked Notes -- A Hierarchical Model of Tail-Dependent Asset Returns -- The Variance Compound Gamma Model -- Multivariate Process for Logarithmic Asset Returns -- Dependence Structure -- Sampling -- Copula Properties -- An Application Example -- Portfolio Setup -- Test Portfolios -- Parameter Setup -- Simulation Results -- Importance Sampling Algorithm -- Conclusions -- Appendix A: The VCG Probability Distribution Function Appendix B: HAC Representation for the VCG Framework -- Monte Carlo Methods for Portfolio Credit Risk -- Modeling Credit Portfolio Losses -- Risk Measures -- Modeling Dependency -- Estimating Risk Measures via Monte Carlo -- Crude Monte Carlo Estimators -- Importance Sampling -- Specific Models -- The Bernoulli Mixture Model -- Factor Models -- Copula Models -- Intensity Models -- An Example Point Process Model -- Appendix A: A Primer on Rare-event Simulation -- Efficiency -- Importance Sampling -- The Choice of g -- Adaptive Importance Sampling -- Importance Sampling for Stochastic Processes -- Credit Portfolio Risk and Diversification -- Introduction -- Model Setup -- Independent Asset Values -- Correlated Asset Values -- Large Portfolio Limit -- Correlated Diffusion -- Correlated GARCH Process -- Applications of the Structural Recovery Rate -- Conclusions -- PART III CREDIT PORTFOLIO RISK SECURITIZATION AND TRANCHING -- Differences in Tranching Methods: Some Results and Implications -- Defining a Tranche -- The Mathematics of Tranching -- PD-based Tranching -- EL-based Tranching -- The EL of a Tranche Necessarily Increases When Either the Attachment Point or the Detachment Point is Decreased -- Upper Bound on Tranche Expected LGD (LGDt) Assumption Given EL-based Tranches -- Skipping of Some Tranches in the EL-based Approach -- Global Structured Finance Rating -- Asset-Backed Securities -- The ABS Structure for the Experiment -- Cash Flow Modeling -- Modeling and Simulating Defaults -- Expected Loss Rating -- Global Sensitivity Analysis -- Elementary Effects -- Variance-based Method -- Global Sensitivity Analysis Results -- Uncertainty Analysis -- Sensitivity Analysis -- Global Rating -- PART IV CREDIT DERIVATIVES -- Analytic Dynamic Factor Copula Model -- Pricing Equations -- One-factor Copula Model -- Multi-period Factor Copula Models -- Calibration -- Dynamic Modeling of Credit Derivatives -- General Model Choice -- Modeling Option Prices -- Modeling Credit Risk -- Portfolio Credit Derivatives -- Modeling Asset Dynamics -- The Market Model -- The Asset-value Model -- Empirical Analysis -- Elementary Data -- Implied Dividends -- Market Dynamics -- Asset Value Model -- Tranche Pricing -- Out-of-time Application -- Pricing and Calibration in Market Models -- Basic notions -- The model -- Modeling Assumptions -- Absence of Arbitrage -- An affine specification -- Pricing -- Calibration -- Calibration Procedure -- Calibration Results -- Appendix A: Computations -- Counterparty Credit Risk and Clearing of Derivatives -- From the Perspective of an Industrial Corporate with a Focus on Commodity Markets -- Credit exposures in commodity business -- Settlement Exposure -- Performance Exposure -- Example of Fixed Price Deal with Performance Exposure -- Example of a Floating Price Deal with Performance Exposure -- General Remarks on Credit Exposure Concepts -- Ex Ante exposure-reducing techniques -- Payment Terms -- Material Adverse Change Clauses -- Master Agreements -- Netting -- Margining -- Close Out Exposure and Threshold -- Ex Ante risk-reducing techniques -- Credit Enhancements in General -- Parent Company Guarantees -- Letters of Credit -- Credit Insurance -- Clearing via a Central Counterparty -- Ex Post risk-reducing techniques -- Factoring -- Novation -- Risk-reducing Trades -- Hedging with CDS -- Hedging with Contingent-CDS -- Hedging with Puts on Equity -- Ex Post work out considerations -- Practical credit risk management and pricing Peculiarities of commodity markets -- Peculiarities of commodity related credit portfolios -- Credit Risk Capital for a commodity related portfolio measured with an extension of CreditMetrics -- CreditRisk+ study: applied to a commodity related credit portfolio -- CDS Industrial Sector Indices, Credit and Liquidity Risk -- The Data -- Methodology and Results -- Preliminary Analysis -- Common Factor Analysis -- Stability of Relations -- Risk Transfer and Pricing of Illiquid Assets with Loan CDS -- Shipping Market -- Loan Credit Default Swaps -- LCDS Pricing -- Modeling LCDS Under the Intensity-based Model -- Valuation Framework for LCDS -- The Structural Approach -- Credit Risk in Shipping Loans -- Valuation of LCDS on Shipping Loans -- Simulation Model -- Numerical Results -- Appendix A: Monte Carlo Parameterization PART V REGULATION -- Regulatory Capital Requirements for Securitizations -- Regulatory Approaches for Securitizations -- Ratings Based Approach (RBA) -- Supervisory Formula Approach (SFA) -- Standardized Approach (SA) -- Post-crisis Revisions to the Basel Framework -- Regulating OTC Derivatives -- The Wall Street Transparency and Accountability Part of the Dodd-Frank Act of 2010 -- Which Derivatives Will Be Affected? …”
Full text (MFA users only)
Electronic eBook