Search Results - (((((((ant OR wantin) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 42
- Mathematics 39
- Mathematical models 35
- Mathematical optimization 26
- artificial intelligence 26
- Machine learning 25
- Algorithms 24
- algorithms 21
- Social aspects 18
- Artificial Intelligence 17
- Technological innovations 17
- Computer networks 16
- Data mining 16
- History 14
- Computer algorithms 13
- Digital techniques 12
- Information technology 12
- Research 12
- Statistical methods 12
- methods 12
- Design and construction 11
- Image processing 11
- Python (Computer program language) 11
- Development 10
- Engineering 10
- Neural networks (Computer science) 10
- Application software 9
- Automation 9
- Big data 9
Search alternatives:
- ant »
- wantin »
- mantis »
- cantor »
-
601
Software engineering for embedded systems : methods, practical techniques, and applications
Published 2013Table of Contents: “…-- How much testing is enough? -- When should testing take place? -- Who makes the decisions?…”
Full text (MFA users only)
Electronic eBook -
602
-
603
Cognitive radio communication and networking : principles and practice
Published 2012Table of Contents: “…10.3.3 Game Formulation 369 -- 10.3.4 Bayesian Equilibrium 370 -- 10.3.5 Numerical Results 371 -- 10.4 Games in Collaborative Spectrum Sensing 372 -- 10.4.1 False Report Attack 373 -- 10.4.2 Game Formulation 373 -- 10.4.3 Elements of Game 374 -- 10.4.4 Bayesian Equilibrium 376 -- 10.4.5 Numerical Results 379 -- 11 Cognitive Radio Network 381 -- 11.1 Basic Concepts of Networks 381 -- 11.1.1 Network Architecture 381 -- 11.1.2 Network Layers 382 -- 11.1.3 Cross-Layer Design 384 -- 11.1.4 Main Challenges in Cognitive Radio Networks 384 -- 11.1.5 Complex Networks 385 -- 11.2 Channel Allocation in MAC Layer 386 -- 11.2.1 Problem Formulation 386 -- 11.2.2 Scheduling Algorithm 387 -- 11.2.3 Solution 389 -- 11.2.4 Discussion 390 -- 11.3 Scheduling in MAC Layer 391 -- 11.3.1 Network Model 391 -- 11.3.2 Goal of Scheduling 393 -- 11.3.3 Scheduling Algorithm 393 -- 11.3.4 Performance of the CNC Algorithm 395 -- 11.3.5 Distributed Scheduling Algorithm 396 -- 11.4 Routing in Network Layer 396 -- 11.4.1 Challenges of Routing in Cognitive Radio 397 -- 11.4.2 Stationary Routing 398 -- 11.4.3 Dynamic Routing 402 -- 11.5 Congestion Control in Transport Layer 404 -- 11.5.1 Congestion Control in Internet 404 -- 11.5.2 Challenges in Cognitive Radio 405 -- 11.5.3 TP-CRAHN 406 -- 11.5.4 Early Start Scheme 408 -- 11.6 Complex Networks in Cognitive Radio 417 -- 11.6.1 Brief Introduction to Complex Networks 418 -- 11.6.2 Connectivity of Cognitive Radio Networks 421 -- 11.6.3 Behavior Propagation in Cognitive Radio Networks 423 -- 12 Cognitive Radio Network as Sensors 427 -- 12.1 Intrusion Detection by Machine Learning 429 -- 12.2 Joint Spectrum Sensing and Localization 429 -- 12.3 Distributed Aspect Synthetic Aperture Radar 429 -- 12.4 Wireless Tomography 433 -- 12.5 Mobile Crowdsensing 434 -- 12.6 Integration of 3S 435 -- 12.7 The Cyber-Physical System 435 -- 12.8 Computing 436 -- 12.8.1 Graphics Processor Unit 437 -- 12.8.2 Task Distribution and Load Balancing 437 -- 12.9 Security and Privacy 438.…”
Full text (MFA users only)
Electronic eBook -
604
-
605
-
606
Non-alcoholic fatty liver disease : a practical guide
Published 2013Table of Contents: “…Chapter 8: A primary care perspective of fatty liver: diagnosis, management, prescribing, and when to refer -- Introduction: fatty liver and the metabolic syndrome -- Diagnosis -- Imaging -- Liver function tests -- Evaluation -- History and physical examination -- Alcohol -- Physical examination -- Laboratory tests -- Testing for metabolic disorders -- When to refer -- Management -- Statins and hyperlipidemia -- Use of other medications -- Follow-up -- Conclusions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 9: Imaging of NAFLD -- Introduction -- Imaging evaluation of hepatic steatosis -- Ultrasound -- Computed tomography -- Magnetic resonance -- Comparative performance of US, CT, and MR -- Imaging evaluation of fibrosis and cirrhosis -- Stiffness -- Perfusion -- Diffusion -- Imaging evaluation of non-alcoholic steatohepatitis -- Conclusion -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 10: Non-invasive methods to determine the severity of NAFLD and NASH -- Introduction -- Liver biopsy -- Non-invasive assessment of hepatic steatosis -- Radiological tests -- Other clinical tests -- Non-invasive assessment of NASH -- Clinical parameters -- Biomarkers of apoptosis -- Adipokines -- Biomarkers of oxidative stress -- Other biomarkers -- Non-invasive assessment of fibrosis -- Clinical prediction scores -- Biomarkers of fibrosis -- Physical measurements -- The future -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 11: Fatigue, quality of life, and psychosocial issues for people with NAFLD -- Functional ability in NAFLD -- Symptoms in NAFLD -- Fatigue in NAFLD -- Excessive daytime sleepiness -- Autonomic nervous system dysfunction -- Postural dizziness -- Depression in patients with NAFLD.…”
Full text (MFA users only)
Electronic eBook -
607
Acoustic emission and durability of composite materials
Published 2018Full text (MFA users only)
Electronic eBook -
608
-
609
Designing and Researching of Machines and Technologies for Modern Manufacture.
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
610
-
611
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
612
Nonlinear science and complexity
Published 2007Table of Contents: “…Bruzón -- Applying a new algorithm to derive nonclassical symmetries / M.S. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
613
-
614
-
615
Cybersecurity Law, standards and regulations
Published 2020Table of Contents: “…When encryption was originally envisioned it was primarily designed to protect information from being used by bad actors once stolen. …”
Full text (MFA users only)
Electronic eBook -
616
Stirling Cycle Engines : Inner Workings and Design.
Published 2013Table of Contents: “…-- 3.6 The way forward -- 4 Equivalence conditions for volume variations -- 4.1 Kinematic configuration -- 4.2 'Additional' dead space -- 4.3 Net swept volume -- 5 The optimum versus optimization -- 5.1 An engine from Turkey rocks the boat -- 5.2 ... and an engine from Duxford -- 5.3 Schmidt on Schmidt -- 5.3.1 Volumetric compression ratio rv -- 5.3.2 Indicator diagram shape -- 5.3.3 More from the re-worked Schmidt analysis -- 5.4 Crank-slider mechanism again -- 5.5 Implications for engine design in general -- 6 Steady-flow heat transfer correlations -- 6.1 Turbulent -- or turbulent? …”
Full text (MFA users only)
Electronic eBook -
617
-
618
Techniques and key points for endoscopic cranial base reconstruction
Published 2021Table of Contents: “…Techniques and Key Points for Endoscopic Cranial Base Reconstruction -- MedOne Access Information -- Tittle Page -- Copyright -- Dedication -- Contents -- Videos -- Foreword -- Preface -- Acknowledgments -- Contributors -- Section I Introduction -- 1 Principles of Endoscopic Cranial Base Reconstruction -- 1.1 Introduction -- 1.2 Fundamentals of Endonasal Reconstruction -- 1.3 Repair Options -- 1.4 Vascularized Reconstruction -- 1.5 Reconstruction Decalogue -- 2 Operative Planning and Treatment Algorithm -- 2.1 Introduction -- 2.2 Preoperative Planning -- 2.3 Perioperative and Intraoperative Considerations -- 2.4 Treatment Algorithm -- 2.5 Postoperative Considerations -- 2.5.1 Inpatient Care -- 2.5.2 Outpatient Care -- Section II Nasoseptal Flap and Variations -- 3 Standard Nasoseptal Flap -- 3.1 Anatomy -- 3.2 Fundamentals -- 3.3 Indications -- 3.4 Limitations -- 3.5 Surgical Technique -- 3.5.1 Harvest -- 3.5.2 Reconstruction -- 3.6 Postoperative Care -- 3.7 Managing Complications -- 4 Rescue Nasoseptal Flap -- 4.1 Fundamentals -- 4.2 Indications -- 4.3 Limitations -- 4.4 Surgical Technique -- 4.5 Postoperative Care -- 4.6 Complications -- 5 Extended Nasoseptal Flap -- 5.1 Fundamentals -- 5.2 Indications -- 5.3 Limitations -- 5.4 Surgical Technique -- 5.4.1 Harvest -- 5.4.2 Reconstruction -- 5.5 Postoperative Care -- 5.5.1 One-Week Postoperative Visit -- 5.5.2 One-Month Postoperative Visit -- 5.5.3 Four-Month Postoperative Visit -- 5.6 Complications -- 6 Nasoseptal Flap Pedicle Release -- 6.1 Anatomy -- 6.2 Fundamentals -- 6.3 Indications -- 6.4 Limitations -- 6.5 Surgical Technique -- 6.5.1 360-Degree Bone Removal around the SPA Foramen (Osseous Release) -- 6.5.2 Ipsilateral Transpterygoid Approach -- 6.5.3 360-Degree Circumferential Incision in the Periosteum of the PPF around the SPA (Periosteal Release) -- 6.6 Postoperative Care.…”
Full text (MFA users only)
Electronic eBook -
619
Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009
Published 2010Table of Contents: “…Shafie -- The investigation of input shaping with different polarities for anti-sway control of a gantry crane system / Mohd. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
620
RSSDI Diabetes update 2018
Published 2019Table of Contents: “…-- Chapter 42: Etiopathogenesis and Management of Diabetic Heart Failure -- Chapter 43: Diabetes and Stroke -- Chapter 44: Cellular Mechanism of Atherosclerosis in Diabetes Mellitus -- Chapter 45: Nondiabetic Ocular Complications in Diabetes -- Chapter 46: Nondiabetic Kidney Disease in Patients with Type 2 Diabetes Mellitus: When to Suspect?.…”
Full text (MFA users only)
eBook