Search Results - (((((((ant OR wantii) OR mantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 481

    Coding as literacy : metalithikum IV

    Published 2015
    Table of Contents: “…III From Particular to Genericand the Concept of "Error"; VI Pre-Specific Modeling: Models based on Concrete Universals; VI .I Dedekind Cut: When a Particular Object is Represented by the Negation of Its Complement.…”
    Full text (MFA users only)
    Electronic eBook
  2. 482
  3. 483

    Advanced concepts in mechanical engineering I : Selected, peer reviewed papers from a Collection of Papers from the 6th International Conference on Advanced Concepts in Mechanical...

    Published 2014
    Table of Contents: “…Graphic Method Profiling of the End Mill Cutter Generating the Screw Compressor RotorZPA Worms -- Definition and Technology; Planetary Gear for Counter-Rotating Wind Turbines; Virtual Model to Generate Motions on Cyclic Trajectories; Dynamic Optimization of a Single-Seater Car Suspension System; Structural Synthesis of Parallel Linkages by Multibody Systems Method; Chapter 2: Mechanics of Deformable Bodies; Some Consideration Regarding the Models for Collisions with Plastic Indentation; Optimizing the Shape and Size of Cruciform Specimens Used for Biaxial Tensile Test…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 484

    Emerging trends in advanced science : selected, peer reviewed papers from the International Conference on Emerging Trends in Science, Engineering and Technology (ICETSET-2014), Apr...

    Published 2014
    Table of Contents: “…Emerging Trends in Advanced Science; Preface and Organising Committee; Table of Contents; Analysis, Design and Implementation of DC-DC Boost Converter Using H∞ Loop Shaping Controller; Building Multi-Dimensional Cube to Analyze Public Examination Results: A Business Intelligence Approach; Comparison of Performance Measures of Speed Control for a DC Motor Using Hybrid Intelligent Controller and Optimal LQR; Comparison of Z Source and Embedded Z Source Inverters in Micro Wind Power Generation System; Comparative Analysis of Various Modulation Strategies for Induction Heating System…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 485

    Industrial engineering and applied research : selected, peer reviewed papers from the 2014 3rd International Conference on Industrial Design and Mechanics Power (3rd ICIDMP 2014),...

    Published 2014
    Table of Contents: “…3-D Model Reconstruction and Mold Flow Simulation for an Existing Shaped PartAnalysis of Surge Shaft Excavation Process Based on 3-Dimensional Finite Difference Method; Singular Configurations Analysis of a Redundantly Actuated Parallel Manipulator; Two-Machine Flowshop Problem with Release Dates, Rejection and Non-Availability Interval on the First Machine; Internal Flow Field Analysis of Air-Suction Roller-Type Precision Metering Device; The UG Parametric Design of Vertical Horizontal Circular Vibration Drier Chassis…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 486

    Non-line-of-sight radar by Watson, Brian C., Guerci, J. R.

    Published 2019
    Table of Contents: “…5.2 Diffraction -- 5.2.1 KED -- 5.2.2 UTD -- 5.3 SEKE -- 5.4 Radar Simulations Using Elliptical C -- 5.5 Commercial Software -- References -- 6 Computing Hardware Acceleration Strategi -- 6.1 GPU Computational Model -- 6.2 GPU Programming -- 6.3 FPGA -- 6.4 Ray-Tracing Line-of-Sight Algorithms -- 6.4.1 Shapes and Ray Intersections -- 6.4.2 Intersection Acceleration Algorith -- 6.5 GPU Ray-Tracing Example -- 6.6 FPGA Ray Tracing -- References -- About the Authors -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  7. 487

    Artificial Intelligence Research and Development : Proceedings of the 12th International Conference of the Catalan Association for Artificial Intelligence

    Published 2009
    Table of Contents: “…Agell -- A similarity calculus for comparing qualitative shape descriptions / Z. Falomir [and others].…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 488
  9. 489

    Electromagnetic nondestructive evaluation (XII)

    Published 2009
    Table of Contents: “…Elastic Properties of Thermally Aged Fe-Cu Model Alloys Measured by EMAR Method -- Nondestructive Evaluation of Ferromagnetic Structural Materials Using FG Sensor -- Inverse Problem and Imaging -- Standoff Detection and Imaging of Suspicious and Concealed Objects with Electromagnetic Waves in the Centimetre and Millimetre Range -- Pulsed Terahertz Imaging for Nondestructive Evaluation -- On the Imaging of Two-Dimensional Thin Inclusions by a MUSIC-Type Algorithm from Boundary Measurements -- Chance-Constrained Programming: A Tool for Solving Linear Eddy Current Inverse Problem -- A Multiple Frequency Strategy for Reconstruction of Stress Corrosion Crack from ECT Signals -- Estimation Theory Metrics in Electromagnetic NDE -- Three Dimensional Shape Recovery of Fatigue Crack Using Eddy Current Testing Signals -- Application of Electromagnetic Nondestructive Techniques -- Development of Strong Magnetizer and Robust Sensor Mount System to Increase Performance in Detecting Defects on Pipeline -- Electromagnetic Evaluation of Honeycomb Composite Materials -- An Electromagnetic Method for Evaluation of Fatigue and for Detection of Damage at Bjork-Shiley Convexo-Concave Prosthetic Heart Valves -- Electromagnetic Evaluation of Soil Condition -- Investigation of Cu-Pc Thin Films on ITO Substrate by Using a Near-Field Microwave Microprobe -- Noncontact Characterization of Electric Carriers Density at Heterojunction Interfaces -- Electromagnetic Field Interaction with Aqueous Glucose Solution in Dielectric Resonator -- Quantitative Evaluation of Corrosion Shape on Back Surface of SUS Samples by EMAT -- Inspection of 3D Flaws Using EMAT -- Nondestructive Evaluation of Beryllium to Copper Joining for ITER by Using an Electromagnetic Acoustic Transducer (EMAT) -- Subject Index -- Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 490

    Great Myths of Personality. by Donnellan, M. Brent

    Published 2021
    Table of Contents: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Research methods 101 -- Organization of chapters -- Foundational material -- Biological aspects of personality -- Personality assessment -- Personality development -- Well-being/happiness -- Applications of personality -- Basic vocabulary -- References -- Chapter 1 Situational Factors Overwhelm Personality When Predicting Behavior -- Defining personality -- Personality and assessment -- Responding to personality and assessment -- References…”
    Full text (MFA users only)
    Electronic eBook
  11. 491

    Theory and application of special functions : proceedings of an advanced seminar sponsored by the Mathematics Research Center, the University of Wisconsin-Madison, March 31-April 2...

    Published 1975
    Table of Contents: “…Nonlinear recurrence algorithms for elliptic integrals and elliptic functions; 4. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  12. 492

    Beginning software engineering by Stephens, Rod, 1961-

    Published 2015
    Table of Contents: “…WhatWhen; Where; Why; How; Study Users; Refining Requirements; Copy Existing Systems; Clairvoyance; Brainstorm; Recording Requirements; UML; User Stories; Use Cases; Prototypes; Requirements Specification; Validation and Verification; Changing Requirements; Summary; CHAPTER 5: HIGH-LEVEL DESIGN; The Big Picture; What to Specify; Security; Hardware; User Interface; Internal Interfaces; External Interfaces; Architecture; Monolithic; Client/Server; Component-Based; Service-Oriented; Data-Centric; Event-Driven; Rule-Based; Distributed; Mix and Match; Reports; Other Outputs; Database; Audit Trails.…”
    Full text (MFA users only)
    Electronic eBook
  13. 493

    Securing SQL server : protecting Your database from attackers by Cherry, Denny

    Published 2015
    Table of Contents: “…; Personally Identifiable Information; When should security objectives been identified?; How to identify security objectives?…”
    Full text (MFA users only)
    Electronic eBook
  14. 494

    Intelligent computational systems : a multi-disciplinary perspective

    Published 2017
    Table of Contents: “…3.2.1. Genetic Algorithm (GA) -- 3.2.2. Particle Swarm Optimization Algorithm (PSO) -- 3.3. …”
    Full text (MFA users only)
    Electronic eBook
  15. 495

    Mathematics of evolution and phylogeny

    Published 2005
    Table of Contents: “…List of Contributors -- 1 The minimum evolution distance-based approach of phylogenetic inference -- 1.1 Introduction -- 1.2 Tree metrics -- 1.2.1 Notation and basics -- 1.2.2 Three-point and four-point conditions -- 1.2.3 Linear decomposition into split metrics -- 1.2.4 Topological matrices -- 1.2.5 Unweighted and balanced averages -- 1.2.6 Alternate balanced basis for tree metrics -- 1.2.7 Tree metric inference in phylogenetics -- 1.3 Edge and tree length estimation -- 1.3.1 The LS approach -- 1.3.2 Edge length formulae -- 1.3.3 Tree length formulae -- 1.3.4 The positivity constraint -- 1.3.5 The balanced scheme of Pauplin -- 1.3.6 Semple and Steel combinatorial interpretation -- 1.3.7 BME: a WLS interpretation -- 1.4 The agglomerative approach -- 1.4.1 UPGMA and WPGMA -- 1.4.2 NJ as a balanced minimum evolution algorithm -- 1.4.3 Other agglomerative algorithms -- 1.5 Iterative topology searching and tree building -- 1.5.1 Topology transformations.; 1.5.2 A fast algorithm for NNIs with OLS -- 1.5.3 A fast algorithm for NNIs with BME -- 1.5.4 Iterative tree building with OLS -- 1.5.5 From OLS to BME -- 1.6 Statistical consistency -- 1.6.1 Positive results -- 1.6.2 Negative results -- 1.6.3 Atteson's safety radius analysis -- 1.7 Discussion -- Acknowledgements -- 2 Likelihood calculation in molecular phylogenetics -- 2.1 Introduction -- 2.2 Markov models of sequence evolution -- 2.2.1 Independence of sites -- 2.2.2 Setting up the basic model -- 2.2.3 Stationary distribution -- 2.2.4 Time reversibility -- 2.2.5 Rate of mutation -- 2.2.6 Probability of sequence evolution on a tree -- 2.3 Likelihood calculation: the basic algorithm -- 2.4 Likelihood calculation: improved models -- 2.4.1 Choosing the rate matrix -- 2.4.2 Among site rate variation -- 2.4.3 Site-specific rate variation -- 2.4.4 Correlated evolution between sites -- 2.5 Optimizing parameters -- 2.5.1 Optimizing continuous parameters -- 2.5.2 Searching for the optimal tree.; 2.5.3 Alternative search strategies -- 2.6 Consistency of the likelihood approach -- 2.6.1 Statistical consistency -- 2.6.2 Identifiability of the phylogenetic models -- 2.6.3 Coping with errors in the model -- 2.7 Likelihood ratio tests -- 2.7.1 When to use the asymptotic x2 distribution -- 2.7.2 Testing a subset of real parameters -- 2.7.3 Testing parameters with boundary conditions -- 2.7.4 Testing trees -- 2.8 Concluding remarks -- Acknowledgements -- 3 Bayesian inference in molecular phylogenetics -- 3.1 The likelihood function and maximum likelihood estimates -- 3.2 The Bayesian paradigm -- 3.3 Prior -- 3.4 Markov chain Monte Carlo -- 3.4.1 Metropolis-Hastings algorithm -- 3.4.2 Single-component Metropolis-Hastings algorithm -- 3.4.3 Gibbs sampler -- 3.4.4 Metropolis-coupled MCMC -- 3.5 Simple moves and their proposal ratios -- 3.5.1 Sliding window using uniform proposal -- 3.5.2 Sliding window using normally distributed proposal.; 3.5.3 Sliding window using normal proposal in multidimensions -- 3.5.4 Proportional shrinking and expanding -- 3.6 Monitoring Markov chains and processing output -- 3.6.1 Diagnosing and validating MCMC algorithms -- 3.6.2 Gelman and Rubin's potential scale reduction statistic -- 3.6.3 Processing output -- 3.7 Applications to molecular phylogenetics -- 3.7.1 Estimation of phylogenies -- 3.7.2 Estimation of species divergence times -- 3.8 Conclusions and perspectives -- Acknowledgements -- 4 Statistical approach to tests involving phylogenies -- 4.1 The statistical approach to phylogenetic inference -- 4.2 Hypotheses testing -- 4.2.1 Null and alternative hypotheses -- 4.2.2 Test statistics -- 4.2.3 Significance and power -- 4.2.4 Bayesian hypothesis testing -- 4.2.5 Questions posed as function of the tree parameter -- 4.2.6 Topology of treespace -- 4.2.7 The data -- 4.2.8 Statistical paradigms -- 4.2.9 Distributions on treespace -- 4.3 Different types of tests involving phylogenies.; 4.3.1 Testing t1 versus t2 -- 4.3.2 Conditional tests -- 4.3.3 Modern Bayesian hypothesis testing -- 4.3.4 Bootstrap tests -- 4.4 Non-parametric multivariate hypothesis testing -- 4.4.1 Multivariate con.dence regions -- 4.5 Conclusions: there are many open problems -- Acknowledgements -- 5 Mixture models in phylogenetic inference -- 5.1 Introduction: models of gene-sequence evolution -- 5.2 Mixture models -- 5.3 Defining mixture models -- 5.3.1 Partitioning and mixture models -- 5.3.2 Discrete-gamma model as a mixture model -- 5.3.3 Combining rate and pattern-heterogeneity -- 5.4 Digression: Bayesian phylogenetic inference -- 5.4.1 Bayesian inference of trees via MCMC -- 5.5 A mixture model combining rate and pattern-heterogeneity -- 5.5.1 Selected simulation results -- 5.6 Application of the mixture model to inferring the phylogeny of the mammals -- 5.6.1 Model testing -- 5.7 Results -- 5.7.1 How many rate matrices to include in the mixture model?…”
    Full text (MFA users only)
    Electronic eBook
  16. 496

    Ultra-wideband signals and systems in communication engineering by Ghavami, M.

    Published 2004
    Table of Contents: “…Ultra Wideband Signals and Systems in Communication Engineering; Contents; Preface; Acknowledgments; List of Figures; List of Tables; Introduction; I.1 Ultra wideband overview; I.2 A note on terminology; I.3 Historical development of UWB; I.4 Key benefits of UWB; I.5 UWB and Shannon's theory; I.6 Challenges for ultra wideband; I.7 Summary; 1 Basic properties of UWB signals and systems; 1.1 Introduction; 1.2 Power spectral density; 1.3 Pulse shape; 1.4 Pulse trains; 1.5 Spectral masks; 1.6 Multipath; 1.7 Penetration characteristics; 1.8 Spatial and spectral capacities…”
    Full text (MFA users only)
    Electronic eBook
  17. 497
  18. 498
  19. 499

    Biological computation by Lamm, Ehud

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  20. 500

    Minor Surgery at a Glance. by Mohan, Helen

    Published 2017
    Table of Contents: “…Part 3 Core surgical knowledge -- 17 Skin incisions -- Scalpels -- Holding the scalpel to make an incision -- Basic principles for incision -- Minor surgical incisions -- Techniques for a good scar -- Electrodissection to incise -- 18 Principles of wound closure -- Plan the skin incision -- Choosing the suture size -- Choosing the suture material -- Suture placement -- Technique for simple interrupted sutures -- When should I use a different suturing technique? …”
    Full text (MFA users only)
    Electronic eBook