Search Results - (((((((ant OR wanti) OR mwantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 41
- Data processing 39
- Mathematics 31
- Mathematical models 27
- Machine learning 26
- artificial intelligence 26
- Algorithms 25
- algorithms 24
- Mathematical optimization 23
- Data mining 21
- Technological innovations 20
- Artificial Intelligence 17
- Computer algorithms 17
- Computer networks 17
- Information technology 16
- Big data 14
- Social aspects 14
- Management 13
- methods 13
- Development 12
- Research 12
- Data Mining 11
- Application software 10
- Design and construction 10
- Electronic data processing 10
- History 10
- Neural networks (Computer science) 10
- Diseases 9
- Philosophy 9
- Python (Computer program language) 9
Search alternatives:
- mwantis »
-
521
Banking and finance issues in emerging markets.
Published 2018Full text (MFA users only)
Electronic eBook -
522
Symbolic computation and education
Published 2007Full text (MFA users only)
Electronic Conference Proceeding eBook -
523
Informatics for Health
Published 2017Table of Contents: “…Connected and Digital Health -- Design and Validation of a Platform to Evaluate mHealth Apps -- Reasoning and Data Representation in a Health and Lifestyle Support System -- Feasibility of Representing a Danish Microbiology Model Using FHIR -- Establishment of Requirements and Methodology for the Development and Implementation of GreyMatters, a Memory Clinic Information System -- Nurses' Perspectives on In-Home Monitoring of Elderlies's Motion Pattern -- Monitoring Activities Related to Medication Adherence in Ambient Assisted Living Environments -- Design, Implementation and Operation of a Reading Center Platform for Clinical Studies -- Web Validation Service for Ensuring Adherence to the DICOM Standard -- A Decision Support System for Cardiac Disease Diagnosis Based on Machine Learning Methods -- Severity Summarization and Just in Time Alert Computation in mHealth Monitoring -- Towards Safe and Efficient Child Primary Care -- Gaps in the Use of Unique Identifiers in Europe -- Why Are Children's Interests Invisible in European National E-Health Strategies? -- Shared Decision Making via Personal Health Record Technology for Routine Use of Diabetic Youth: A Study Protocol -- A Medication Reminder Mobile App: Does It Work for Different Age Ranges -- Internet of Things in Health Trends Through Bibliometrics and Text Mining -- Developing the Safety Case for MediPi: An Open-Source Platform for Self Management -- UK Health and Social Care Case Studies: Iterative Technology Development -- 2. …”
Full text (MFA users only)
Electronic eBook -
524
Progress reports on impedance spectroscopy : measurements, modeling, and application
Published 2017Full text (MFA users only)
Electronic eBook -
525
Stochastic filtering with applications in finance
Published 2010Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
Full text (MFA users only)
Electronic eBook -
526
Essentials of Monte Carlo Simulation : Statistical Methods for Building Simulation Models.
Published 2012Full text (MFA users only)
Electronic eBook -
527
-
528
The structure of amorphous materials using molecular dynamics
Published 2023Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
Full text (MFA users only)
Electronic eBook -
529
Language processing and grammars : the role of functionally oriented computational models
Published 2014Full text (MFA users only)
Electronic eBook -
530
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
531
Binary decision diagrams and extensions for system reliability analysis
Published 2015Table of Contents: “…7.5 Applications to Phased-Mission Systems -- 7.5.1 Mini-Component Concept -- 7.5.2 Extended SEA Method for PMS -- 7.5.3 An Illustrative Example -- 7.6 Summary -- 8 Shared Decision Diagrams -- 8.1 Multi-Rooted Decision Diagrams -- 8.2 Multi-Terminal Decision Diagrams -- 8.3 Performance Study on Multi-State Systems -- 8.3.1 Example Analyses -- 8.3.2 Benchmark Studies -- 8.4 Application to Phased-Mission Systems -- 8.4.1 PMS Analysis Using MDDs -- 8.4.1.1 Step 1-Variable Encoding -- 8.4.1.2 Step 2-Input Variable Ordering -- 8.4.1.3 Step 3-PMS MDD Generation -- 8.4.1.4 Step 4-PMS MDD Evaluation -- 8.4.2 An Illustrative Example -- 8.5 Application to Multi-State k-out-of-n Systems -- 8.5.1 Multi-State k-out-of-n System Analysis Using MDDs -- 8.5.1.1 Step 1- BDDkl Generation -- 8.5.1.2 Step 2- MDDkl Generation -- 8.5.1.3 Step 3- MDDSj Generation -- 8.5.1.4 Step 4-System MDDSj Evaluation -- 8.5.2 An Illustrative Example -- 8.6 Importance Measures -- 8.6.1 Capacity Networks and Reliability Modeling -- 8.6.2 Composite Importance Measures (Type 1) -- 8.6.2.1 General CIMs -- 8.6.2.2 Alternative CIMs -- 8.6.3 Computing CIMs Using MDD -- 8.6.4 An Illustrative Example -- 8.7 Failure Frequency Based Measures -- 8.8 Summary -- Conclusions -- References -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
532
Advanced security solutions for multimedia
Published 2021Full text (MFA users only)
Electronic eBook -
533
Statistical learning from a regression perspective
Published 2008Full text (MFA users only)
Electronic eBook -
534
Power system wide-area stability analysis and control
Published 2018Full text (MFA users only)
Electronic eBook -
535
The internet of things and big data analytics integrated platforms and industry use cases
Published 2020Full text (MFA users only)
Electronic eBook -
536
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
Full text (MFA users only)
Electronic eBook -
537
Advanced wireless communications & Internet : future evolving technologies
Published 2011Table of Contents: “…Glisic -- 11.1 Introduction 585 -- 11.2 Background and Related Work 586 -- 11.3 Cooperative Communications 593 -- 11.4 Relay-Assisted Communications 616 -- 11.5 Two-Way Relay-Assisted Communications 646 -- 11.6 Relay-Assisted Communications With Reuse of Resources 651 -- Appendices 668 -- 12 Biologically Inspired Paradigms inWireless Networks 683 -- 12.1 Biologically Inspired Model for Securing Hybrid Mobile Ad Hoc Networks 683 -- 12.2 Biologically Inspired Routing in Ad Hoc Networks 687 -- 12.3 Analytical Modeling of AntNet as Adaptive Mobile Agent Based Routing 691 -- 12.4 Biologically Inspired Algorithm for Optimum Multicasting 697 -- 12.5 Biologically Inspired (BI) Distributed Topology Control 703 -- 12.6 Optimization of Mobile Agent Routing in Sensor Networks 708 -- 12.7 Epidemic Routing 710 -- 12.8 Nano-Networks 715 -- 12.9 Genetic Algorithm Based Dynamic Topology Reconfiguration in Cellular Multihop Wireless Networks 718 -- References 739 -- 13 Positioning in Wireless Networks 743 -- 13.1 Mobile Station Location in Cellular Networks 743.…”
Full text (MFA users only)
Electronic eBook -
538
SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention.
Published 2020Table of Contents: “…CHAPTER 4 Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- 4.1 INTRODUCTION -- 4.2 RELATED WORK -- 4.3 THE kNNVWC APPROACH -- 4.3.1 FWC Algorithm and Its Limitations -- 4.3.2 Various-Widths Clustering -- 4.3.3 The k-NN Search -- 4.4 EXPERIMENTAL EVALUATION -- 4.4.1 Data Sets -- 4.4.2 Performance Metrics -- 4.4.3 Impact of Cluster Size -- 4.4.4 Baseline Methods -- 4.4.5 Distance Metric -- 4.4.6 Complexity Metrics -- 4.5 CONCLUSION -- CHAPTER 5 SCADA Data-Driven Anomaly Detection -- 5.1 INTRODUCTION -- 5.2 SDAD APPROACH -- 5.2.1 Observation State of SCADA Points…”
Full text (MFA users only)
Electronic eBook -
539
NGN architectures, protocols, and services
Published 2014Table of Contents: “…1.7 The Convergence of the Two Worlds: Next Generation Networks1.7.1 NGN Perspective of Telecom Operators; 1.7.2 When Will NGN Emerge?; 1.8 The Structure of This Book; References; Chapter 2 Internet Fundamentals by IETF; 2.1 Internet Architecture and IETF Standardization; 2.2 Fundamental Internet Protocols; 2.2.1 Internet Protocol Version 4; 2.2.2 Internet Protocol Version 6; 2.2.3 User Datagram Protocol; 2.2.4 Transmission Control Protocol; 2.2.5 Stream Control Transmission Protocol; 2.3 Addressing and Numbering; 2.3.1 IPv4 Addressing; 2.3.2 Network Address Translation.…”
Full text (MFA users only)
Electronic eBook -
540
Qualitative Spatial and Temporal Reasoning.
Published 2012Table of Contents: “…Generalized Intervals; 3.1. "When they built the bridge."…”
Full text (MFA users only)
Electronic eBook