Search Results - (((((((ant OR want) OR semantic) OR went) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 241
  2. 242

    Emerging engineering approaches and applications : selected, peer reviewed papers from the 2011 International Conference on Information Engineering for Mechanics and Materials, Aug...

    Published 2011
    Table of Contents: “…A Hierarchical Structure of Service-Oriented Manufacturing ModeStudy of Combination Algorithm in Partitioning Manufacture Technology; The Machinability of MAR-M247 Superalloy; Chapter 3: Computational Methods for Engineering; The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension; An Evaluation Survey of Score Normalization in Multibiometric Systems; Non-Line-of-Sight Error Mitigation in Wireless Communication Systems; Information Delay Protocol Using Non-Orthogonal Quantum States; A New Algorithm of Image Encryption Based on 3D Arnold Cat…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 243

    Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management. by Gabrijelčič, Primož

    Published 2018
    Table of Contents: “…; Different types of speed; Algorithm complexity; Big O and Delphi data structures; Data structures in practice; Mr. …”
    Full text (MFA users only)
    Electronic eBook
  4. 244

    Materials Science and Intelligent Technologies Applications : Selected, Peer Reviewed Papers from the 2014 3rd International Conference on Key Engineering Materials and Computer Sc...

    Published 2014
    Table of Contents: “…Automatic Badminton Action Recognition Using RGB-D SensorKinect-Based Badminton Action Analysis System; A Review of Hot Topic Detection and Tracking Technology; Study on the Improvement of TFIDF Algorithm in Data Mining; A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values; Human Posture Recognition Based on DAG-SVMS; The Design and Implementation of Astronomical Multi-Catalog Storage and Cross-Match Based on Hadoop; The Multi-Scale Hough Transform Lane Detection Method Based on the Algorithm of Otsu and Canny; Design of Heart Sound Analyzer.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 245

    The bitcoin big bang : how alternative currencies are about to change the world by Kelly, Brian, 1971-

    Published 2014
    Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
    Full text (MFA users only)
    Electronic eBook
  6. 246

    Building Machine Learning Systems with Python. by Richert, Willi

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  7. 247
  8. 248
  9. 249

    Iaeng transactions on electrical engineering. Vol. 1, Special issue of the International Multiconference of Engineers and Computer Scientists 2012

    Published 2013
    Table of Contents: “…Pawar -- Web services for chronic pain monitoring / Nuno Goncalo Coelho Costa Pombo, Pedro Jose Guerra de Araujo and Joaquim Manuel Vieira da Silva Viana -- Parallel binomial American option pricing on CPU-GPU hybrid platform / Nan Zhang, Chi-Un Lei and Ka Lok Man -- The subsystem grouping scheme using use case dependency graph and domain-specific semantic model for large complex systems / Nanchaya Khrueahong and Wiwat Vatanawood -- MOBM: a methodology for building practical domain ontologies from database information / Minyoung Ra [and others] -- A trial of the dynamic weighted sum method for multi-objective optimization / Hong Zhang -- A multi-agent platform to manage distributed and heterogeneous knowledge by using semantic web / Inaya Lahoud [and others] -- An intelligent train marshaling based on the processing time considering group layout of freight cars / Yoichi Hirashima -- A web-based multilingual intelligent tutor system based on Jackson's learning styles profiler and expert systems / H. …”
    Full text (MFA users only)
    Electronic eBook
  10. 250

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  11. 251

    High performance computing on complex environments by Jeannot, Emmanuel

    Published 2014
    Table of Contents: “…Chapter 4: Parallel Algorithms for Parabolic Problems on Graphs in Neuroscience4.1 Introduction; 4.2 Formulation of the Discrete Model; 4.3 Parallel Algorithms; 4.4 Computational Results; 4.5 Conclusions; Acknowledgments; References; Part III: Communication and Storage Considerations in High-Performance Computing; Chapter 5: An Overview of Topology Mapping Algorithms and Techniques in High-Performance Computing; 5.1 Introduction; 5.2 General Overview; 5.3 Formalization of the Problem; 5.4 Algorithmic Strategies for Topology Mapping; 5.5 Mapping Enforcement Techniques; 5.6 Survey of Solutions.…”
    Full text (MFA users only)
    Electronic eBook
  12. 252
  13. 253
  14. 254

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  15. 255

    Advances in time series forecasting. Volume 2

    Published 2017
    Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
    Full text (MFA users only)
    Electronic eBook
  16. 256

    Automatic Text Summarization by Torres-Moreno, Juan-Manuel

    Published 2014
    Table of Contents: “…State-of-the-art approaches; 3.4. Latent semantic analysis; 3.5. Graph-based approaches; 3.6. …”
    Full text (MFA users only)
    Electronic eBook
  17. 257

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…4.3.1 Run and Phrase -- 4.3.2 Multi-State Compression Algorithm -- 4.4 Proposed Multi-State Inference Algorithm -- 4.4.1 Rules for Calculating Intermediate Variables -- 4.4.2 Proposed Multi-State Inference Algorithm -- 4.5 Case Study -- 4.5.1 Case Background -- 4.5.2 Calculation and Analysis -- 4.6 Summary -- Appendix A -- Appendix B -- References -- Chapter 5 Reliability Analysis of Demand-Based Warm Standby System with Multi-State Common Bus -- 5.1 Introduction -- 5.2 Model Description for a DBWSS with Multi-State Common Bus Performance Sharing…”
    Full text (MFA users only)
    Electronic eBook
  18. 258

    PRINCIPLES OF QUANTUM ARTIFICIAL INTELLIGENCE. by Wichert, Andreas

    Published 2013
    Table of Contents: “…Computation; 2.1 Entscheidungsproblem; 2.1.1 Cantor's diagonal argument; 2.1.2 Reductio ad absurdum; 2.2 Complexity Theory; 2.2.1 Decision problems; 2.2.2 P and NP; 2.3 Church-Turing Thesis; 2.3.1 Church-Turing-Deutsch principle; 2.4 Computers; 2.4.1 Analog computers; 2.4.2 Digital computers; 2.4.3 Von Neumann architecture; 3. …”
    Full text (MFA users only)
    Electronic eBook
  19. 259
  20. 260

    Aggregating Dialectology, Typology, and Register Analysis : Linguistic Variation in Text and Speech

    Published 2014
    Table of Contents: “…Kretzschmar -- A weakly supervised multivariate approach to the study of language variation / Sascha Diwersy, Stefan Evert, and Stella Neumann -- Semantic weighting mechanisms in scalable lexical sociolectometry / Tom Ruette, Dirk Geeraerts, Yves Peirsman and Dirk Speelman -- Temperature in the word space : Sense exploration of temperature expressions using word-space modelling / Maria Koptjevskaja-Tamm and Magnus Sahlgren -- The perfect map : Investigating the cross-linguistic distribution of TAME categories in a parallel corpus / Östen Dahl -- Explorations into variation across Slavic : Taking a bottom-up approach / Ruprecht von Waldenfels -- Where Alice fell into : Motion events from a parallel corpus / Annemarie Verkerk -- Algorithmic typology and going from known to similar unknown categories within and across languages / Bernhard Wälchli -- Inducing place distinctions of consonants from their distribution in words / Thomas Mayer -- Laws of language and text in quantitative and synergetic linguistics / Reinhard Köhler.…”
    Full text (MFA users only)
    Electronic eBook