Search Results - (((((((ant OR want) OR mantis) OR wind) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 221

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 222

    High performance computing on complex environments by Jeannot, Emmanuel

    Published 2014
    Table of Contents: “…Chapter 4: Parallel Algorithms for Parabolic Problems on Graphs in Neuroscience4.1 Introduction; 4.2 Formulation of the Discrete Model; 4.3 Parallel Algorithms; 4.4 Computational Results; 4.5 Conclusions; Acknowledgments; References; Part III: Communication and Storage Considerations in High-Performance Computing; Chapter 5: An Overview of Topology Mapping Algorithms and Techniques in High-Performance Computing; 5.1 Introduction; 5.2 General Overview; 5.3 Formalization of the Problem; 5.4 Algorithmic Strategies for Topology Mapping; 5.5 Mapping Enforcement Techniques; 5.6 Survey of Solutions.…”
    Full text (MFA users only)
    Electronic eBook
  3. 223

    Advanced Manufacturing Research and Intelligent Applications : Selected, Peer Reviewed Papers from the International Conference on Computational Intelligence and Advanced Manufactu...

    Published 2014
    Table of Contents: “…Experimental Investigations on Machining Micro Alloy Steel (MAS 38MnSiVS5) Using K 20 Multi Coated Carbide InsertImproving the Hardness of a Wind Turbine Gear Surface by Nitriding Process; Design of Electromechanical Engine for Zero Direct Emission; VED & ABC Analysis of Inventories for a Wind Turbine Company; Analysis on the Performance, Combustion and Emission Characteristicsof a CI Engine Fuelled with Algae Biodiesel; Reducing UT Rejections in Cr-Mo and High Mn Steels by Controlling Hydrogen and Optimising Superheat; Synthesis and Characteristic of AA6061/SiC Sand Cast Composite.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 224
  5. 225

    Technologies for sustainable development : proceedings of the 7th Nirma University International Conference on Engineering (NUiCONE 2019), November 21-22, 2019, Ahmedabad, India

    Published 2020
    Table of Contents: “…Accessibility of BRTS station in Ahmedabad city using GIS: A case study -- Shear strength parameters of soil and banana fiber mix -- Impact of temperature and duration of calcination of metakaolin on the compressive strength of metakaolin incorporated concrete -- Numerical analysis of shape-memory-alloy-wire based smart natural rubber bearing -- Techniques used for structural health monitoring and its application: A review -- Characterization of air based pneumatic damper for seismic response control -- Generation of wind time history data for nonlinear wind analysis of buildings…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 226

    Research on Mechanical Engineering, Civil Engineering and Material Engineering : Selected, peer reviewed papers from the 2013 International Conference on Mechanical Engineering, Ci...

    Published 2013
    Table of Contents: “…Analysis of Working Condition and Load Direction for Tripod Substructure of Offshore Wind TurbineThe Rotation Speed Control of DC Servo Motor Based on Fuzzy-PI Dual Mode; Route Planning of Geomagnetic Aided Navigation for Vehicle under Matching Suitability Constraints; Risk Assessment of Gravity Dam with Machine Properties; Integral Sliding Mode Control Based on Exponential Approach Law for Brushless Double Fed Machines; Temperature Measurement Algorithm Research of Boiler Furnace Based on BP Network…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 227

    Communicating process architectures 2002. by World Occam And Transputer User Group. Technical Meeting (25th: 2002: University Of Reading, U. K.)

    Published 2002
    Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  8. 228

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  9. 229

    Advances in time series forecasting. Volume 2

    Published 2017
    Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
    Full text (MFA users only)
    Electronic eBook
  10. 230

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…4.3.1 Run and Phrase -- 4.3.2 Multi-State Compression Algorithm -- 4.4 Proposed Multi-State Inference Algorithm -- 4.4.1 Rules for Calculating Intermediate Variables -- 4.4.2 Proposed Multi-State Inference Algorithm -- 4.5 Case Study -- 4.5.1 Case Background -- 4.5.2 Calculation and Analysis -- 4.6 Summary -- Appendix A -- Appendix B -- References -- Chapter 5 Reliability Analysis of Demand-Based Warm Standby System with Multi-State Common Bus -- 5.1 Introduction -- 5.2 Model Description for a DBWSS with Multi-State Common Bus Performance Sharing…”
    Full text (MFA users only)
    Electronic eBook
  11. 231

    PRINCIPLES OF QUANTUM ARTIFICIAL INTELLIGENCE. by Wichert, Andreas

    Published 2013
    Table of Contents: “…Computation; 2.1 Entscheidungsproblem; 2.1.1 Cantor's diagonal argument; 2.1.2 Reductio ad absurdum; 2.2 Complexity Theory; 2.2.1 Decision problems; 2.2.2 P and NP; 2.3 Church-Turing Thesis; 2.3.1 Church-Turing-Deutsch principle; 2.4 Computers; 2.4.1 Analog computers; 2.4.2 Digital computers; 2.4.3 Von Neumann architecture; 3. …”
    Full text (MFA users only)
    Electronic eBook
  12. 232

    Creating wicked students : designing courses for a complex world by Hanstedt, Paul, 1965-

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  13. 233

    Cognitive Electronic Warfare : An Artificial Intelligence Approach. by Haigh, Karen

    Published 2021
    Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
    Full text (MFA users only)
    Electronic eBook
  14. 234

    Pulmonary arterial hypertension : diagnosis and evidence-based treatment

    Published 2008
    Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
    Full text (MFA users only)
    Electronic eBook
  15. 235

    Machine Learning with Swift : Artificial Intelligence for iOS. by Sosnovshchenko, Oleksandr

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  16. 236

    Code : Collaborative Ownership and the Digital Economy. by Ghosh, Rishab Aiyer

    Table of Contents: “…Oral Traditions, Indigenous Rights, and Valuable Old Knowledge -- 7 From Keeping "Nature's Secrets" to the Institutionalization of "Open Science" -- 8 Benefit Sharing: Experiments in Governance -- 9 Trust among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information -- 10 Cooking-Pot Markets and Balanced Value Flows -- 11 Coase's Penguin, or, Linux and the Nature of the Firm -- 12 Paying for Public Goods -- 13 Fencing Off Ideas: Enclosure and the Disappearance of the Public Domain -- 14 A Renaissance of the Commons: How the New Sciences and Internet are Framing a New Global Identity and Order -- 15 Positive Intellectual Rights and Information Exchanges -- 16 Copyright and Globalization in the Age of Computer Networks -- Contributors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  17. 237
  18. 238

    Mechanisms and games for dynamic spectrum allocation

    Published 2013
    Table of Contents: “…7.3.10 Other equilibrium concepts -- 7.4 Learning equilibria -- 7.4.1 Learning Nash equilibria -- 7.4.2 Learning epsilon-equilibrium -- 7.4.3 Learning coarse correlated equilibrium -- 7.4.4 Learning satisfaction equilibrium -- 7.4.5 Discussion -- 7.5 Conclusion -- References -- II Cognitive radio and sharing of unlicensed spectrum -- 8 Cooperation in cognitiveradio networks: from accessto monitoring -- 8.1 Introduction -- 8.1.1 Cooperation in cognitive radio: mutual benefits and costs -- 8.2 An overview of coalitional game theory -- 8.3 Cooperative spectrum exploration and exploitation -- 8.3.1 Motivation -- 8.3.2 Basic problem -- 8.3.3 Joint sensing and access as a cooperative game -- 8.3.4 Coalition formation algorithm for joint sensing and access -- 8.3.5 Numerical results -- 8.4 Cooperative primary user activity monitoring -- 8.4.1 Motivation -- 8.4.2 Primary user activity monitoring: basic model -- 8.4.3 Cooperative primary user monitoring -- 8.4.4 Numerical results -- 8.5 Summary -- Acknowledgements -- Copyright notice -- References -- 9 Cooperative cognitive radios with diffusion networks -- 9.1 Introduction -- 9.2 Preliminaries -- 9.2.1 Basic tools in convex and matrix analysis -- 9.2.2 Graphs -- 9.3 Distributed spectrum sensing -- 9.4 Iterative consensus-based approaches -- 9.4.1 Average consensus algorithms -- 9.4.2 Acceleration techniques for iterative consensus algorithms -- 9.4.3 Empirical evaluation -- 9.5 Consensus techniques based on CoMAC -- 9.6 Adaptive distributed spectrum sensing based on adaptive subgradient techniques -- 9.6.1 Distributed detection with adaptive filters -- 9.6.2 Set-theoretic adaptive filters for distributed detection -- 9.6.3 Empirical evaluation -- 9.7 Channel probing -- 9.7.1 Introduction -- 9.7.2 Admissibility problem -- 9.7.3 Power and admission control algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  19. 239

    There's Something about Gödel : The Complete Guide to the Incompleteness Theorem. by Berto, Francesco

    Published 2009
    Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
    Full text (MFA users only)
    eBook
  20. 240

    Applications of digital signal processing to audio and acoustics

    Published 2002
    Full text (MFA users only)
    Electronic eBook