Search Results - (((((((ant OR wants) OR semantic) OR find) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 69
- Artificial intelligence 47
- Mathematics 46
- Machine learning 42
- Mathematical models 42
- Data mining 32
- Algorithms 30
- algorithms 29
- Mathematical optimization 25
- artificial intelligence 25
- methods 23
- Computer networks 22
- Computer algorithms 19
- Computer science 18
- Digital techniques 17
- Information technology 17
- Python (Computer program language) 17
- Technological innovations 17
- Artificial Intelligence 16
- Big data 16
- Image processing 16
- Data Mining 15
- Management 15
- Research 15
- Signal processing 14
- Bioinformatics 12
- Neural networks (Computer science) 12
- R (Computer program language) 12
- Social aspects 12
- Computer security 11
Search alternatives:
- ant »
- wants »
- semantic »
- cantor »
- find »
- plane »
-
641
-
642
-
643
Recent advances in computational sciences : selected papers from the International Workshop on Computational Sciences and its Education, Beijing, China, 29-31 August 2005
Published 2008Full text (MFA users only)
Electronic Conference Proceeding eBook -
644
Mathematical Methods in Interdisciplinary Sciences.
Published 2020Table of Contents: “…1.2.2.1 Architecture of Single-Layer LgNN Model -- 1.2.2.2 Training Algorithm of Laguerre Neural Network (LgNN) -- 1.2.2.3 Gradient Computation of LgNN -- 1.3 Methodology for Solving a System of Fredholm Integral Equations of Second Kind -- 1.3.1 Algorithm -- 1.4 Numerical Examples and Discussion -- 1.4.1 Differential Equations and Applications -- 1.4.2 Integral Equations -- 1.5 Conclusion -- References -- Chapter 2 Deep Learning in Population Genetics: Prediction and Explanation of Selection of a Population -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Dataset Description…”
Full text (MFA users only)
Electronic eBook -
645
Computer and network security essentials
Published 2018Table of Contents: “…SECURITY APPLICATIONS -- Chapter 25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking -- Chapter 26. …”
Full text (MFA users only)
Electronic eBook -
646
Disobedient Aesthetics : Surveillance, Bodies, Control
Published 2024Full text (MFA users only)
Electronic eBook -
647
Personality Revolution : Using AI to Understand Your Customers and Win More Business.
Published 2019Table of Contents: “…Navigating a Complex, Biased, Hyper-connected WorldPART II Read Your Own User Manual: Understanding your personality and how to harness it; Chapter 6 Personality Differences Shape Every Relationship; Chapter 7 How to Find Your Personality Type; Chapter 8 Take a Personality Assessment; Using your personality at work; Chapter 9 The 16 Personality Types; Type D: The Captain; Type Di: The Driver; Type DI: The Initiator; Type ID: The Influencer; Type I: The Motivator; Type Is: The Encourager; Type IS: The Harmonizer; Type SI: The Counselor; Type S: The Supporter; Type Sc: The Planner…”
Full text (MFA users only)
Electronic eBook -
648
Understanding ultrasonic level measurement
Published 2013Table of Contents: “…. -- Ultrasonic instrumentation -- The transducer -- Transducer environments -- Transducer accuracy -- Transducer resolution and accuracy -- Impedance matching -- Axis of transmission -- Beam width -- Beam spreading -- Ringdown -- The controllers -- Digital filtering -- Averaging echoes -- Echo extraction algorithms -- Summary -- Notes.…”
Full text (MFA users only)
Electronic eBook -
649
Blockchain and the Digital Economy : The Socio-Economic Impact of Blockchain Technology.
Published 2020Full text (MFA users only)
Electronic eBook -
650
Fuzzy intelligent systems : methodologies, techniques, and applications
Published 2021Table of Contents: “…7.1 Introduction -- 7.2 Existing Technology and its Review -- 7.3 Research Design -- 7.4 Findings or Result Discussion so for in the Area of GFS Hybridization -- 7.5 Conclusion -- References -- 8 Using Fuzzy Technique Management of Configuration and Status of VM for Task Distribution in Cloud System -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Logic System for Fuzzy -- 8.4 Proposed Algorithm -- 8.5 Results of Simulation -- 8.6 Conclusion -- References -- 9 Theorems on Fuzzy Soft Metric Spaces -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 FSMS -- 9.4 Main Results…”
Full text (MFA users only)
Electronic eBook -
651
System : the shaping of modern knowledge
Published 2016Table of Contents: “…7 SECRETLY SEEKING SYSTEM-INSTITUTING THE SOCIAL -- SUBJECTS FOR SYSTEMS-"THE PROSCRIBED LITTLE PERSONAGE-I" -- THE "CHARACTER OF MEMBERS"-CLUBS AS INTERFACES -- SYSTEM INCARNATE-DANCING INTO MODERNITY -- CODA -- Re:ENLIGHTENMENT (ALGORITHMICALLY ENHANCED SYSTEMS) -- "THE WHOLE ENCHILADA" -- THE PERSISTENCE OF SYSTEM -- APPENDIX A: NOTES ON VISUALIZATION -- THE SCATTER PLOTS -- THE TECTONIC DIAGRAMS -- TECHNICAL NOTES -- APPENDIX B: TITLES CONTAINING ESSAY(S) IN THE PLURAL VERSUS THE SINGULAR -- NOTES -- PROLOGUE -- CHAPTER 1 -- CHAPTER 2 -- CHAPTER 3 -- CHAPTER 4 -- CHAPTER 5 -- CHAPTER 6 -- CHAPTER 7 -- CODA -- REFERENCES -- INDEX.…”
Full text (MFA users only)
Electronic eBook -
652
Analytics stories : using data to make good things happen
Published 2021Table of Contents: “…-- Value-Added Assessments of Teacher Effectiveness -- Berkeley, Buses, Cars, and Planes -- Is Carmelo Anthony a Hall of Famer? -- Was Derek Jeter a great fielder? …”
Full text (MFA users only)
Electronic eBook -
653
Steel connection analysis
Published 2018Table of Contents: “…2.3.1 Need for the Jnode Concept2.3.2 Jnode Definition; 2.4 Jnode Analytics; 2.4.1 Classification of Jnodes; 2.4.2 Simple Jnodes; 2.4.3 Hierarchical Jnodes; 2.4.4 Central Jnodes; 2.4.5 Cuspidal Jnodes; 2.4.6 Tangent Jnodes; 2.4.7 Constraints; 2.4.8 Summary of Jnode Classification; 2.4.9 Setting Connection Codes: Examples; 2.5 Equal Jnodes Detection; 2.5.1 Toponode; 2.5.2 Jnode Data Structure; 2.5.3 Superimposable Member Couples; 2.5.4 Criteria to Assess Jnodes Equality; 2.5.5 Algorithm to Find Equal Jnodes; 2.5.6 Examples; 2.6 Structural Connectivity Indices; 2.7 Particular Issues.…”
Full text (MFA users only)
Electronic eBook -
654
FX barrier options : a comprehensive guide for industry quants
Published 2015Table of Contents: “…Stupid; 4.10 Five things we want from a model; 4.11 Stochastic volatility (SV) models; 4.11.1 SABR model; 4.11.2 Heston model; 4.12 Mixed local/stochastic volatility (lsv) models; 4.12.1 Term structure of volatility of volatility; 4.13 Other models and methods; 4.13.1 Uncertain Volatility (UV) models; 4.13.2 Jump-diffusion models; 4.13.3 Vanna-volga methods; 5 Smile Risk Management; 5.1 Black-Scholes with term structure; 5.2 Local volatility model; 5.3 Spot risk under smile models; 5.4 Theta risk under smile models; 5.5 Mixed local/stochastic volatility models; 5.6 Static hedging; 5.7 Managing risk across businesses; 6 Numerical Methods; 6.1 Finite-difference (FD) methods; 6.1.1 Grid geometry; 6.1.2 Finite-difference schemes; 6.2 Monte Carlo (MC) methods; 6.2.1 Monte Carlo schedules; 6.2.2 Monte Carlo algorithms; 6.2.3 Variance reduction; 6.2.4 The Brownian Bridge; 6.2.5 Early…”
Full text (MFA users only)
Electronic eBook -
655
Explorations in Computing : an Introduction to Computer Science.
Published 2010Full text (MFA users only)
Electronic eBook -
656
Convergence of Communications, Navigation, Sensing and Services.
Published 2014Table of Contents: “…5.5.1 Formulation of the Problem for Finding a GeneralizedP-median Set as a Linear Programming5.5.2 ADD/DROP Heuristics Algorithm; 5.6 Example of Application of ADD/DROP Heuristics for Solving the Cascade Problem of Hierarchically Connected Sets; 5.7 Conclusion; References; Biographies; 6 Machine-to-Machine Communications for CONASENSE; 6.1 Introduction; 6.2 Wireless Infrastructure; 6.2.1 Ubiquitous Connections via 3GPP Heterogeneous Network (HetNet) Architecture; 6.2.2 D2D Empowered Group Based Operations of MTC Devices; 6.2.3 Cognitive Operations of MTC Devices.…”
Full text (MFA users only)
Electronic eBook -
657
Mastering OpenCV with Practical Computer Vision Projects.
Published 2012Table of Contents: “…Marker-less Augmented Reality; Marker-based versus marker-less AR; Using feature descriptors to find an arbitrary image on video; Feature extraction; Definition of a pattern object.…”
Full text (MFA users only)
Electronic eBook -
658
Trading the Measured Move : a Path to Trading Success in a World of Algos and High Frequency Trading.
Published 2013Full text (MFA users only)
Electronic eBook -
659
Securing SQL server : protecting Your database from attackers
Published 2015Table of Contents: “…Server FirewallsWindows Firewall Inbound Rules; Windows Firewall Outbound Rules; Special Requirements for Clustering; Direct Internet Access; Public IP addresses versus private IP addresses; vLANs; Accessing SQL server from home; Setting up Routing and Remote Access; Allowing Users to VPN in to the Network; Setting up Client VPN Connection; Physical security; Keep Your Hands Off My Box; Open Network Ports; Unlocked Workstations; Automatically Locking Computers; Social engineering; Finding the instances; Testing the network security; Antivirus installation on SQL servers; Summary; References.…”
Full text (MFA users only)
Electronic eBook -
660
Asymptotic models of fields in dilute and densely packed composites
Published 2002Table of Contents: “…Motivation; 1.1.2 Asymptotic algorithm involving a boundary layer; 1.1.2.1 Formulation of the problem; 1.1.2.2 The leading-order approximation; 1.1.2.3 Asymptotic formula for the energy; 1.1.3 The dipole matrix; 1.1.3.1 Definition of the dipole matrix; 1.1.3.2 Symmetry of the dipole matrix; 1.1.3.3 The energy asymptotics for a body with a small void; 1.1.4 Dipole matrix for a 2D void in an infinite plane.…”
Full text (MFA users only)
Electronic eBook