Search Results - (((((((ant OR wantii) OR semantic) OR wind) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 341

    Twelfth Scandinavian Conference on Artificial Intelligence : SCAI 2013

    Published 2013
    Table of Contents: “…Traceable Uncertainty for Threat Evaluation in Air to Ground ScenariosKnowledge-Based Industrial Robotics; Probabilistic Inference in BN2T Models by Weighted Model Counting; Doctoral Symposium; On Programming Organization-Aware Agents; Enhancing Recall in Semantic Querying; Industrial Robot Skills; Learning Inverse Kinematics Problem in Changing Task Environment; Neural Network for Prediction of Glucose Concentration in Type 1 Diabetic Patients; Subject Index; Author Index…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 342

    Structural-functional studies in English grammar : in honor of Lachlan Mackenzie

    Published 2007
    Table of Contents: “…Conclusion -- References -- Notes towards an incremental implementation of the Role and Reference Grammar semantics-to-syntax linking algorithm for English -- 1. …”
    Full text (MFA users only)
    Electronic eBook
  3. 343

    Measurement technology and its application III : selected, peer reviewed papers from the 2014 3rd International Conference on Measurement, Instrumentation and Automation (ICMIA 201...

    Published 2014
    Table of Contents: “…The Displacement Measurement of Ground Wind Loads for Launch VehicleThe Relations between UT1 Precision and Radio Source Sky-Coverage; The Research of GPS Elevation Fitting Considering the Influence of Covariance Function; Enabling Standardization in Shear Bond Strength Tests for Orthodontic Adhesives on Natural Teeth by Using an Innovative Grip Accessory for the Testing Machine; Knock Detection and Evaluation of Kerosene Piston Engine; Correction of the Popular Bias Test Method Recommended by ISO/TS16949 for Manufacturing Industries.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 344

    Mechanical, Electronic and Information Technology Engineering

    Published 2015
    Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  5. 345

    Robotics : science and systems III

    Published 2008
    Table of Contents: “…Semantic Modeling of Places using Objects / Ananth Ranganathan and Frank Dellaert -- Design of a Bio-inspired Dynamical Vertical Climbing Robot / Jonathan E. …”
    Full text (MFA users only)
    Electronic eBook
  6. 346

    Advanced Analytics with R and Tableau. by Stirrup, Jen

    Published 2016
    Table of Contents: “…; Understanding the performance of the result; Next steps; Sharing our data analysis using Tableau; Interpreting the results; Summary; Chapter 5: Classifying Data with Tableau; Business understanding; Understanding the data; Data preparation; Describing the data; Data exploration; Modeling in R; Analyzing the results of the decision tree; Model deployment; Decision trees in Tableau using R; Bayesian methods; Graphs; Terminology and representations; Graph implementations; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  7. 347
  8. 348

    Towards 5G : Applications, Requirements and Candidate Technologies. by Vannithamby, Rath

    Published 2016
    Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
    Full text (MFA users only)
    Electronic eBook
  9. 349

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  10. 350
  11. 351

    Information Networking in Asia

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  12. 352

    Lead generation for dummies by Rothman, Dayna

    Published 2014
    Table of Contents: “…Creating an Internal Blogging ProgramChapter 9: Creating Lasting Relationships Through Social Media; Sharing on Social Media; Getting the Most out of Facebook; Leveraging Twitter; Engaging Through LinkedIn; Building Your Google+ Presence; Getting Visual with Pinterest; Attracting Attention with SlideShare; Chapter 10: Getting Found Through Search Engine Optimization; Maximizing Different Traffic Sources; Knowing Your Search Engines; Making the Most out of Google Algorithm Updates; Choosing Your Keywords; Perfecting On-Page SEO; Utilizing Links in a Natural Way.…”
    Full text (MFA users only)
    Electronic eBook
  13. 353

    Global optimization methods in geophysical inversion by Sen, Mrinal K.

    Published 2013
    Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
    Full text (MFA users only)
    Electronic eBook
  14. 354

    Limits, Limits Everywhere : the Tools of Mathematical Analysis by Applebaum, David, 1956-

    Published 2012
    Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
    Full text (MFA users only)
    Electronic eBook
  15. 355

    Legitimate applications of peer to peer networks by Verma, Dinesh C.

    Published 2004
    Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
    Full text (MFA users only)
    Electronic eBook
  16. 356

    Microbiological sensors for the drinking water industry

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  17. 357

    Modern development in materials, machinery and automation : selected, peer reviewed papers from the 2013 International Conference on Microtechnology and MEMS (ICMM 2013), May 22-23...

    Published 2013
    Table of Contents: “…An Adaptive Intra-Frame Refresh Algorithm Based on Rate Distortion OptimizationA New Method for the Optimal Configuration of Ship-Based Aircraft Based on the Extended Backpack; Application of Bayesian for the Situation Assessment of Sea-Battlefield; The Application of Semantic Similarity in Text Classification; The Research of Clock Traffic Congestion Model and Synchronization Technology; Chapter 4: Product Design; Research on Motion Capture Instruments in Sports; A Study of Innovative Product Design for Drinking Cups; A Study of Customized Innovative Self-Portrait Product Design…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 358

    Methodological and analytic frontiers in lexical research

    Published 2012
    Table of Contents: “…Behavioral profiles: A fine-grained and quantitative approach in corpus-based lexical semantics (by Gries, Stefan Th.); 5. 5. Using a maze task to track lexical and sentence processing (by Forster, Kenneth I.); 6. 6. …”
    Full text (MFA users only)
    Electronic eBook
  19. 359

    Formal Synthesis of Safety Controller Code for Distributed Controllers. by Missal, Dirk

    Published 2012
    Table of Contents: “…7.3 Comparison8 Embedding Control Functions in IEC 61499 Function Blocks; 8.1 IEC 61499 Basic Function Blocks; 8.2 Transformation; 8.2.1 Interface; 8.2.2 Algorithms; 8.2.3 Execution Control Chart; 8.3 Use and extension; 9 Conclusions and Outlook; A Appendix.…”
    Full text (MFA users only)
    Electronic eBook
  20. 360

    Current development of mechanical engineering and energy : selected, peer reviewed papers from the 2013 International Symposium on Vehicle, Mechanical, and Electrical Engineering (...

    Published 2014
    Table of Contents: “…Simulation and Study on Ride Comfort of Articulated Dump Truck Based on Rigid-Flex CouplingThe Hall Automotive Wheel Speed Sensor and Simulation for its Signal Processing; Wind-Induced Vibration of the Rear-View Mirrors of Car at High Speed; Research on the Affection of Vehicle Lateral Stability Related to the Improved ABS; The Quantification Research of Engine Body Defect that Tested by Ultrasonic Phased Array; Analysis of Vehicle Interior Low-Frequency Noise Based on ATV; The Engine Oil Sump Radiated Noise Optimization Design; A Novel OFDM Radar Algorithm in Vehicular Environment…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook