Search Results - (((((((ant OR wantisi) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 41
- Data processing 39
- Mathematics 31
- Mathematical models 27
- Machine learning 26
- artificial intelligence 26
- Algorithms 25
- algorithms 24
- Mathematical optimization 23
- Data mining 21
- Technological innovations 20
- Artificial Intelligence 17
- Computer algorithms 17
- Computer networks 17
- Information technology 16
- Big data 14
- Social aspects 14
- Management 13
- methods 13
- Development 12
- Research 12
- Data Mining 11
- Application software 10
- Design and construction 10
- Electronic data processing 10
- History 10
- Neural networks (Computer science) 10
- Diseases 9
- Philosophy 9
- Python (Computer program language) 9
Search alternatives:
- wantisi »
-
441
Chases and escapes : the mathematics of pursuit and evasion
Published 2012Full text (MFA users only)
Electronic eBook -
442
Data management in the semantic web
Published 2011Table of Contents: “…Single-RelationalNetworkAlgorithms; 3.3.1. ShortestPath; 3.3.2. Eccentricity, Radius, and Diameter; 3.3.3. …”
Full text (MFA users only)
Electronic eBook -
443
Trading the Measured Move : a Path to Trading Success in a World of Algos and High Frequency Trading.
Published 2013Full text (MFA users only)
Electronic eBook -
444
Coding as literacy : metalithikum IV
Published 2015Table of Contents: “…III From Particular to Genericand the Concept of "Error"; VI Pre-Specific Modeling: Models based on Concrete Universals; VI .I Dedekind Cut: When a Particular Object is Represented by the Negation of Its Complement.…”
Full text (MFA users only)
Electronic eBook -
445
Blockchain and the Digital Economy : The Socio-Economic Impact of Blockchain Technology.
Published 2020Full text (MFA users only)
Electronic eBook -
446
Arithmetic, Geometry, Cryptography and Coding Theory.
Published 2017Full text (MFA users only)
Electronic eBook -
447
Indoor Geolocation Science and Technology : At the Emergence of Smart World and IoT.
Published 2019Full text (MFA users only)
Electronic eBook -
448
Great Myths of Personality.
Published 2021Table of Contents: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Research methods 101 -- Organization of chapters -- Foundational material -- Biological aspects of personality -- Personality assessment -- Personality development -- Well-being/happiness -- Applications of personality -- Basic vocabulary -- References -- Chapter 1 Situational Factors Overwhelm Personality When Predicting Behavior -- Defining personality -- Personality and assessment -- Responding to personality and assessment -- References…”
Full text (MFA users only)
Electronic eBook -
449
PHealth 2017 : proceedings of the 14th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 14-16 May 2017, Eindhoven, the Netherlands
Published 2017Table of Contents: “…Information System of Personalized Patient's Adherence Level DeterminationSmartphones to Access to Patient Data in Hospital Settings: Authentication Solutions for Shared Devices; pHealth and Population Health; Architecture for Variable Data Entry into a National Registry; Patient Summaries in Context of Large Scale EHR Networks with Fine Granular Access Control Restrictions; Behavioral Aspects; Classifying Drivers' Cognitive Load Using EEG Signals; Open Dataset for the Automatic Recognition of Sedentary Behaviors.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
450
Informatics and technology in clinical care and public health
Published 2022Table of Contents: “…Intro -- Title Page -- Preface -- ICIMTH 2021 Scientific Programme Committee and Reviewers -- Contents -- Using Artificial Intelligence to Develop a Lexicon-Based African American Tweet Detection Algorithm to Inform Culturally Sensitive Twitter-Based Social Support Interventions for African American Dementia Caregivers -- A Comparison of Word Embeddings to Study Complications in Neurosurgery -- Gulf Cooperation Council Clinical Trials in the Pursuit of Medications for COVID-19…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
451
The neural basis of free will : criterial causation
Published 2013Table of Contents: “…-- Iconic versus Working Memory -- Stage 1 Qualia as Precompiled Informational Outputs of Preconscious Operations -- Qualia as a Shared Format for Endogenous Attentional Operations -- Experience Is for Endogenously Attending, Doing, and Planning -- Volitional Attentional Tracking Requires Consciousness -- If an Animal Can Attentionally Track, Is it Conscious? …”
Full text (MFA users only)
Electronic eBook -
452
Multi-processor system-on-chip. 1, Architectures
Published 2021Table of Contents: “…Matrix multiplication algorithm on the Plural architecture…”
Full text (MFA users only)
Electronic eBook -
453
Theory and application of special functions : proceedings of an advanced seminar sponsored by the Mathematics Research Center, the University of Wisconsin-Madison, March 31-April 2...
Published 1975Table of Contents: “…Nonlinear recurrence algorithms for elliptic integrals and elliptic functions; 4. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
454
Beginning software engineering
Published 2015Table of Contents: “…WhatWhen; Where; Why; How; Study Users; Refining Requirements; Copy Existing Systems; Clairvoyance; Brainstorm; Recording Requirements; UML; User Stories; Use Cases; Prototypes; Requirements Specification; Validation and Verification; Changing Requirements; Summary; CHAPTER 5: HIGH-LEVEL DESIGN; The Big Picture; What to Specify; Security; Hardware; User Interface; Internal Interfaces; External Interfaces; Architecture; Monolithic; Client/Server; Component-Based; Service-Oriented; Data-Centric; Event-Driven; Rule-Based; Distributed; Mix and Match; Reports; Other Outputs; Database; Audit Trails.…”
Full text (MFA users only)
Electronic eBook -
455
Securing SQL server : protecting Your database from attackers
Published 2015Table of Contents: “…; Personally Identifiable Information; When should security objectives been identified?; How to identify security objectives?…”
Full text (MFA users only)
Electronic eBook -
456
Mathematics of evolution and phylogeny
Published 2005Table of Contents: “…List of Contributors -- 1 The minimum evolution distance-based approach of phylogenetic inference -- 1.1 Introduction -- 1.2 Tree metrics -- 1.2.1 Notation and basics -- 1.2.2 Three-point and four-point conditions -- 1.2.3 Linear decomposition into split metrics -- 1.2.4 Topological matrices -- 1.2.5 Unweighted and balanced averages -- 1.2.6 Alternate balanced basis for tree metrics -- 1.2.7 Tree metric inference in phylogenetics -- 1.3 Edge and tree length estimation -- 1.3.1 The LS approach -- 1.3.2 Edge length formulae -- 1.3.3 Tree length formulae -- 1.3.4 The positivity constraint -- 1.3.5 The balanced scheme of Pauplin -- 1.3.6 Semple and Steel combinatorial interpretation -- 1.3.7 BME: a WLS interpretation -- 1.4 The agglomerative approach -- 1.4.1 UPGMA and WPGMA -- 1.4.2 NJ as a balanced minimum evolution algorithm -- 1.4.3 Other agglomerative algorithms -- 1.5 Iterative topology searching and tree building -- 1.5.1 Topology transformations.; 1.5.2 A fast algorithm for NNIs with OLS -- 1.5.3 A fast algorithm for NNIs with BME -- 1.5.4 Iterative tree building with OLS -- 1.5.5 From OLS to BME -- 1.6 Statistical consistency -- 1.6.1 Positive results -- 1.6.2 Negative results -- 1.6.3 Atteson's safety radius analysis -- 1.7 Discussion -- Acknowledgements -- 2 Likelihood calculation in molecular phylogenetics -- 2.1 Introduction -- 2.2 Markov models of sequence evolution -- 2.2.1 Independence of sites -- 2.2.2 Setting up the basic model -- 2.2.3 Stationary distribution -- 2.2.4 Time reversibility -- 2.2.5 Rate of mutation -- 2.2.6 Probability of sequence evolution on a tree -- 2.3 Likelihood calculation: the basic algorithm -- 2.4 Likelihood calculation: improved models -- 2.4.1 Choosing the rate matrix -- 2.4.2 Among site rate variation -- 2.4.3 Site-specific rate variation -- 2.4.4 Correlated evolution between sites -- 2.5 Optimizing parameters -- 2.5.1 Optimizing continuous parameters -- 2.5.2 Searching for the optimal tree.; 2.5.3 Alternative search strategies -- 2.6 Consistency of the likelihood approach -- 2.6.1 Statistical consistency -- 2.6.2 Identifiability of the phylogenetic models -- 2.6.3 Coping with errors in the model -- 2.7 Likelihood ratio tests -- 2.7.1 When to use the asymptotic x2 distribution -- 2.7.2 Testing a subset of real parameters -- 2.7.3 Testing parameters with boundary conditions -- 2.7.4 Testing trees -- 2.8 Concluding remarks -- Acknowledgements -- 3 Bayesian inference in molecular phylogenetics -- 3.1 The likelihood function and maximum likelihood estimates -- 3.2 The Bayesian paradigm -- 3.3 Prior -- 3.4 Markov chain Monte Carlo -- 3.4.1 Metropolis-Hastings algorithm -- 3.4.2 Single-component Metropolis-Hastings algorithm -- 3.4.3 Gibbs sampler -- 3.4.4 Metropolis-coupled MCMC -- 3.5 Simple moves and their proposal ratios -- 3.5.1 Sliding window using uniform proposal -- 3.5.2 Sliding window using normally distributed proposal.; 3.5.3 Sliding window using normal proposal in multidimensions -- 3.5.4 Proportional shrinking and expanding -- 3.6 Monitoring Markov chains and processing output -- 3.6.1 Diagnosing and validating MCMC algorithms -- 3.6.2 Gelman and Rubin's potential scale reduction statistic -- 3.6.3 Processing output -- 3.7 Applications to molecular phylogenetics -- 3.7.1 Estimation of phylogenies -- 3.7.2 Estimation of species divergence times -- 3.8 Conclusions and perspectives -- Acknowledgements -- 4 Statistical approach to tests involving phylogenies -- 4.1 The statistical approach to phylogenetic inference -- 4.2 Hypotheses testing -- 4.2.1 Null and alternative hypotheses -- 4.2.2 Test statistics -- 4.2.3 Significance and power -- 4.2.4 Bayesian hypothesis testing -- 4.2.5 Questions posed as function of the tree parameter -- 4.2.6 Topology of treespace -- 4.2.7 The data -- 4.2.8 Statistical paradigms -- 4.2.9 Distributions on treespace -- 4.3 Different types of tests involving phylogenies.; 4.3.1 Testing t1 versus t2 -- 4.3.2 Conditional tests -- 4.3.3 Modern Bayesian hypothesis testing -- 4.3.4 Bootstrap tests -- 4.4 Non-parametric multivariate hypothesis testing -- 4.4.1 Multivariate con.dence regions -- 4.5 Conclusions: there are many open problems -- Acknowledgements -- 5 Mixture models in phylogenetic inference -- 5.1 Introduction: models of gene-sequence evolution -- 5.2 Mixture models -- 5.3 Defining mixture models -- 5.3.1 Partitioning and mixture models -- 5.3.2 Discrete-gamma model as a mixture model -- 5.3.3 Combining rate and pattern-heterogeneity -- 5.4 Digression: Bayesian phylogenetic inference -- 5.4.1 Bayesian inference of trees via MCMC -- 5.5 A mixture model combining rate and pattern-heterogeneity -- 5.5.1 Selected simulation results -- 5.6 Application of the mixture model to inferring the phylogeny of the mammals -- 5.6.1 Model testing -- 5.7 Results -- 5.7.1 How many rate matrices to include in the mixture model?…”
Full text (MFA users only)
Electronic eBook -
457
-
458
Minor Surgery at a Glance.
Published 2017Table of Contents: “…Part 3 Core surgical knowledge -- 17 Skin incisions -- Scalpels -- Holding the scalpel to make an incision -- Basic principles for incision -- Minor surgical incisions -- Techniques for a good scar -- Electrodissection to incise -- 18 Principles of wound closure -- Plan the skin incision -- Choosing the suture size -- Choosing the suture material -- Suture placement -- Technique for simple interrupted sutures -- When should I use a different suturing technique? …”
Full text (MFA users only)
Electronic eBook -
459
The SMART CYBER ECOSYSTEM FOR SUSTAINABLE DEVELOPMENT.
Published 2021Full text (MFA users only)
Electronic eBook -
460
A primer on experiments with mixtures
Published 2011Table of Contents: “…QuestionsAppendix 2A: Least-Squares Estimation Formula for the Polynomial Coefficients and Their Variances: Matrix Notation; Appendix 2B: Cubic and Quartic Polynomials and Formulas for the Estimates of the Coefficients; Appendix 2C: The Partitioning of the Sources in the Analysis of Variance Table When Fitting the Scheffé Mixture Models; 3. Multiple Constraints on the Component Proportions; 3.1 Lower-Bound Restrictions on Some or All of the Component Proportions; 3.2 Introducing L-Pseudocomponents; 3.3 A Numerical Example of Fitting An L-Pseudocomponent Model.…”
Full text (MFA users only)
Electronic eBook