Search Results - (((((((ant OR wanting) OR semantics) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.

Search alternatives:

  1. 201

    New Techniques in Digital Holography

    Published 2015
    Table of Contents: “…Discrete Fresnel transform; 1.3.1.1. Algorithm; 1.3.1.2. Spatial resolution in the reconstructed plane; 1.3.1.3. …”
    Full text (MFA users only)
    Electronic eBook
  2. 202
  3. 203

    Internal combustion engine bearings lubrication in hydrodynamic bearings by Bonneau, Dominique, 1948-, Fatu, Aurelian, Souchet, Dominique

    Published 2014
    Table of Contents: “…Resolution algorithm for the joint plane behavior problem; 2.4.4.4. …”
    Full text (MFA users only)
    Electronic eBook
  4. 204

    Singular Null Hypersurfaces in General Relativity : Light-Like Signals from Violent Astrophysical Events. by Hogan, P. A.

    Published 2004
    Table of Contents: “…General Description of an Impulsive Light-Like Signal ; 2.1 Distributional Algorithm ; 2.2 Transverse Curvature Algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  5. 205

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  6. 206
  7. 207

    Advanced Control and Optimization Paradigms for Energy System Operation and Management. by Pal, Kirti

    Published 2023
    Table of Contents: “…3.4: Procedure -- 3.4.1: Solar Photovoltaic System -- 3.4.2: Wind Turbine -- 3.4.3: Battery Energy Storage System -- 3.4.4: Diesel Generator -- 3.5: Modelling of the HRES with Different kinds of Batteries -- 3.6: System Metrics -- 3.6.1: Economic Metrics -- 3.6.2: Technical Performance of the Overall System -- 3.6.3: Contribution of Solar PV -- 3.6.4: Contribution of Wind Turbine and Diesel Generator -- 3.6.5: Technical Specification of Different Batteries Used in HRES -- 3.7: State of Charge of Battery -- 3.8: Emissions through a Different System with Different Batteries -- 3.9: Conclusions…”
    Full text (MFA users only)
    Electronic eBook
  8. 208

    CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260). by Singh, Glen D.

    Published 2018
    Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
    Full text (MFA users only)
    Electronic eBook
  9. 209

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 210

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  11. 211

    Generative design by Agkathidis, Asterios, 1974-

    Published 2015
    Table of Contents: “…Intro; 1.0 Introduction to Generative Design; 2.0 Continuous Surfaces; 3.0 Modularity and Accumulation; 4.0 Deformation and Subtraction; 5.0 Algorithmic Patterns; 6.0 Triangulation ; 7.0 Conclusion: The Digital Vs Physical Debate ; Bibliography ; Index; Picture Credits; Acknowledgements; 1.1 Design methods in architecture: A brief review; 1.2 Generative form-finding processes; 1.3 The approach of this book; 2.1 Soft mesh; 2.2 Double-curved shells; 2.3 Hyper paraboloids; 3.1 Interlocking units; 3.2 Irregular units; 4.1 Twisted block; 4.2 Porous space; 5.1 Tessellated planes…”
    Full text (MFA users only)
    Electronic eBook
  12. 212

    Iaeng transactions on electrical engineering. Vol. 1, Special issue of the International Multiconference of Engineers and Computer Scientists 2012

    Published 2013
    Table of Contents: “…Fiedler -- An integrated approach to power quality problems in micro-grids / Tsao-Tsung Ma -- Discriminating among inrush current, external short circuit and internal winding fault in power transformer using coefficient of DWT / Jittiphong Klomjit and Atthapol Ngaopitakkul -- Classification of temporal characteristics of epileptic EEG subbands based on the local maxima / S. …”
    Full text (MFA users only)
    Electronic eBook
  13. 213

    Inverse problems of vibrational spectroscopy by Yagola, A. G.

    Published 1999
    Table of Contents: “…Angle between a bond and the plane of an atomic triple -- 4.3.5. Angle between two planes (torsion coordinate) -- 4.3.6. …”
    Full text (MFA users only)
    Electronic eBook
  14. 214

    Analysis of biological data : a soft computing approach

    Published 2007
    Table of Contents: “…Feature selection for cancer classification using ant colony optimization and support vector machines / A. …”
    Full text (MFA users only)
    Electronic eBook
  15. 215

    New autonomous systems by Cardon, Alain, 1946-, Itmi, Mhamed

    Published 2016
    Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
    Full text (MFA users only)
    Electronic eBook
  16. 216

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  17. 217
  18. 218

    What Every Teacher Should Know About Effective Teaching Strategies. by Tileston, Donna E. Walker

    Published 1900
    Table of Contents: “…-- Why the Way We Teach is Important -- The Linguistic Modality -- The Nonlinguistic Modality -- The Affective Modality -- Semantic Memory -- Episodic Memory -- Procedural Memory -- Automatic Memory -- Emotional Memory -- Chapter 2 -- Choosing Effective Teaching Strategies for Beginning Activities -- Great Beginnings -- The Self-System…”
    Full text (MFA users only)
    Electronic eBook
  19. 219

    DSP with Python Programming. by Charbit, Maurice

    Published 2017
    Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  20. 220

    Handbook on semidefinite, conic and polynomial optimization

    Published 2012
    Table of Contents: “…Lasserre and Mihai Putinar -- Self-regular interior-point methods for semidefinite optimization / Maziar Salahi and Tamás Terlaky -- Elementary optimality conditions for nonlinear SDPs / Florian Jarre -- Recent progress in interior-point methods: cutting-plane algorithms and warm starts / Alexander Engau -- Exploiting sparsity in SDP relaxation of polynomial optimization problems / Sunyoung Kim and Masakazu Kojima -- Block coordinate descent methods for semidefinite programming / Zaiwen Wen, Donald Goldfarb, and Katya Scheinberg -- Projection methods in conic optimization / Didier Henrion and Jérôme Malick -- SDP relaxations for non-commutative polynomial optimization / Miguel Navascués, Stefano Pironio, and Antonio Acín -- Semidefinite programming and constraint programming / Willem-Jan van Hoeve -- The state-of-the-art in conic optimization software / Hans D. …”
    Full text (MFA users only)
    Electronic eBook