Search Results - (((((((ant OR wants) OR semantic) OR find) OR cantor) OR anne) OR plane) OR hints) algorithms.

  1. 641

    Image-Guided Therapy Systems. by Vaezy, Shahram

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  2. 642

    Bayesian Analysis with Python. by Osvaldo Martin

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  3. 643
  4. 644

    Mathematical Methods in Interdisciplinary Sciences. by Chakraverty, Snehashish

    Published 2020
    Table of Contents: “…1.2.2.1 Architecture of Single-Layer LgNN Model -- 1.2.2.2 Training Algorithm of Laguerre Neural Network (LgNN) -- 1.2.2.3 Gradient Computation of LgNN -- 1.3 Methodology for Solving a System of Fredholm Integral Equations of Second Kind -- 1.3.1 Algorithm -- 1.4 Numerical Examples and Discussion -- 1.4.1 Differential Equations and Applications -- 1.4.2 Integral Equations -- 1.5 Conclusion -- References -- Chapter 2 Deep Learning in Population Genetics: Prediction and Explanation of Selection of a Population -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Dataset Description…”
    Full text (MFA users only)
    Electronic eBook
  5. 645

    Computer and network security essentials

    Published 2018
    Table of Contents: “…SECURITY APPLICATIONS -- Chapter 25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking -- Chapter 26. …”
    Full text (MFA users only)
    Electronic eBook
  6. 646
  7. 647

    Personality Revolution : Using AI to Understand Your Customers and Win More Business. by D'Agostino, Andrew

    Published 2019
    Table of Contents: “…Navigating a Complex, Biased, Hyper-connected WorldPART II Read Your Own User Manual: Understanding your personality and how to harness it; Chapter 6 Personality Differences Shape Every Relationship; Chapter 7 How to Find Your Personality Type; Chapter 8 Take a Personality Assessment; Using your personality at work; Chapter 9 The 16 Personality Types; Type D: The Captain; Type Di: The Driver; Type DI: The Initiator; Type ID: The Influencer; Type I: The Motivator; Type Is: The Encourager; Type IS: The Harmonizer; Type SI: The Counselor; Type S: The Supporter; Type Sc: The Planner…”
    Full text (MFA users only)
    Electronic eBook
  8. 648

    Understanding ultrasonic level measurement by Milligan, Stephen

    Published 2013
    Table of Contents: “…. -- Ultrasonic instrumentation -- The transducer -- Transducer environments -- Transducer accuracy -- Transducer resolution and accuracy -- Impedance matching -- Axis of transmission -- Beam width -- Beam spreading -- Ringdown -- The controllers -- Digital filtering -- Averaging echoes -- Echo extraction algorithms -- Summary -- Notes.…”
    Full text (MFA users only)
    Electronic eBook
  9. 649
  10. 650

    Fuzzy intelligent systems : methodologies, techniques, and applications

    Published 2021
    Table of Contents: “…7.1 Introduction -- 7.2 Existing Technology and its Review -- 7.3 Research Design -- 7.4 Findings or Result Discussion so for in the Area of GFS Hybridization -- 7.5 Conclusion -- References -- 8 Using Fuzzy Technique Management of Configuration and Status of VM for Task Distribution in Cloud System -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Logic System for Fuzzy -- 8.4 Proposed Algorithm -- 8.5 Results of Simulation -- 8.6 Conclusion -- References -- 9 Theorems on Fuzzy Soft Metric Spaces -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 FSMS -- 9.4 Main Results…”
    Full text (MFA users only)
    Electronic eBook
  11. 651

    System : the shaping of modern knowledge by Siskin, Clifford

    Published 2016
    Table of Contents: “…7 SECRETLY SEEKING SYSTEM-INSTITUTING THE SOCIAL -- SUBJECTS FOR SYSTEMS-"THE PROSCRIBED LITTLE PERSONAGE-I" -- THE "CHARACTER OF MEMBERS"-CLUBS AS INTERFACES -- SYSTEM INCARNATE-DANCING INTO MODERNITY -- CODA -- Re:ENLIGHTENMENT (ALGORITHMICALLY ENHANCED SYSTEMS) -- "THE WHOLE ENCHILADA" -- THE PERSISTENCE OF SYSTEM -- APPENDIX A: NOTES ON VISUALIZATION -- THE SCATTER PLOTS -- THE TECTONIC DIAGRAMS -- TECHNICAL NOTES -- APPENDIX B: TITLES CONTAINING ESSAY(S) IN THE PLURAL VERSUS THE SINGULAR -- NOTES -- PROLOGUE -- CHAPTER 1 -- CHAPTER 2 -- CHAPTER 3 -- CHAPTER 4 -- CHAPTER 5 -- CHAPTER 6 -- CHAPTER 7 -- CODA -- REFERENCES -- INDEX.…”
    Full text (MFA users only)
    Electronic eBook
  12. 652

    Analytics stories : using data to make good things happen by Winston, Wayne L.

    Published 2021
    Table of Contents: “…-- Value-Added Assessments of Teacher Effectiveness -- Berkeley, Buses, Cars, and Planes -- Is Carmelo Anthony a Hall of Famer? -- Was Derek Jeter a great fielder? …”
    Full text (MFA users only)
    Electronic eBook
  13. 653

    Steel connection analysis by Rugarli, Paolo, 1963-

    Published 2018
    Table of Contents: “…2.3.1 Need for the Jnode Concept2.3.2 Jnode Definition; 2.4 Jnode Analytics; 2.4.1 Classification of Jnodes; 2.4.2 Simple Jnodes; 2.4.3 Hierarchical Jnodes; 2.4.4 Central Jnodes; 2.4.5 Cuspidal Jnodes; 2.4.6 Tangent Jnodes; 2.4.7 Constraints; 2.4.8 Summary of Jnode Classification; 2.4.9 Setting Connection Codes: Examples; 2.5 Equal Jnodes Detection; 2.5.1 Toponode; 2.5.2 Jnode Data Structure; 2.5.3 Superimposable Member Couples; 2.5.4 Criteria to Assess Jnodes Equality; 2.5.5 Algorithm to Find Equal Jnodes; 2.5.6 Examples; 2.6 Structural Connectivity Indices; 2.7 Particular Issues.…”
    Full text (MFA users only)
    Electronic eBook
  14. 654

    FX barrier options : a comprehensive guide for industry quants by Dadachanji, Zareer

    Published 2015
    Table of Contents: “…Stupid; 4.10 Five things we want from a model; 4.11 Stochastic volatility (SV) models; 4.11.1 SABR model; 4.11.2 Heston model; 4.12 Mixed local/stochastic volatility (lsv) models; 4.12.1 Term structure of volatility of volatility; 4.13 Other models and methods; 4.13.1 Uncertain Volatility (UV) models; 4.13.2 Jump-diffusion models; 4.13.3 Vanna-volga methods; 5 Smile Risk Management; 5.1 Black-Scholes with term structure; 5.2 Local volatility model; 5.3 Spot risk under smile models; 5.4 Theta risk under smile models; 5.5 Mixed local/stochastic volatility models; 5.6 Static hedging; 5.7 Managing risk across businesses; 6 Numerical Methods; 6.1 Finite-difference (FD) methods; 6.1.1 Grid geometry; 6.1.2 Finite-difference schemes; 6.2 Monte Carlo (MC) methods; 6.2.1 Monte Carlo schedules; 6.2.2 Monte Carlo algorithms; 6.2.3 Variance reduction; 6.2.4 The Brownian Bridge; 6.2.5 Early…”
    Full text (MFA users only)
    Electronic eBook
  15. 655
  16. 656

    Convergence of Communications, Navigation, Sensing and Services. by Ligthart, L. P.

    Published 2014
    Table of Contents: “…5.5.1 Formulation of the Problem for Finding a GeneralizedP-median Set as a Linear Programming5.5.2 ADD/DROP Heuristics Algorithm; 5.6 Example of Application of ADD/DROP Heuristics for Solving the Cascade Problem of Hierarchically Connected Sets; 5.7 Conclusion; References; Biographies; 6 Machine-to-Machine Communications for CONASENSE; 6.1 Introduction; 6.2 Wireless Infrastructure; 6.2.1 Ubiquitous Connections via 3GPP Heterogeneous Network (HetNet) Architecture; 6.2.2 D2D Empowered Group Based Operations of MTC Devices; 6.2.3 Cognitive Operations of MTC Devices.…”
    Full text (MFA users only)
    Electronic eBook
  17. 657

    Mastering OpenCV with Practical Computer Vision Projects. by Emami, Shervin

    Published 2012
    Table of Contents: “…Marker-less Augmented Reality; Marker-based versus marker-less AR; Using feature descriptors to find an arbitrary image on video; Feature extraction; Definition of a pattern object.…”
    Full text (MFA users only)
    Electronic eBook
  18. 658
  19. 659

    Securing SQL server : protecting Your database from attackers by Cherry, Denny

    Published 2015
    Table of Contents: “…Server FirewallsWindows Firewall Inbound Rules; Windows Firewall Outbound Rules; Special Requirements for Clustering; Direct Internet Access; Public IP addresses versus private IP addresses; vLANs; Accessing SQL server from home; Setting up Routing and Remote Access; Allowing Users to VPN in to the Network; Setting up Client VPN Connection; Physical security; Keep Your Hands Off My Box; Open Network Ports; Unlocked Workstations; Automatically Locking Computers; Social engineering; Finding the instances; Testing the network security; Antivirus installation on SQL servers; Summary; References.…”
    Full text (MFA users only)
    Electronic eBook
  20. 660

    Asymptotic models of fields in dilute and densely packed composites by Movchan, A. B. (Alexander B.)

    Published 2002
    Table of Contents: “…Motivation; 1.1.2 Asymptotic algorithm involving a boundary layer; 1.1.2.1 Formulation of the problem; 1.1.2.2 The leading-order approximation; 1.1.2.3 Asymptotic formula for the energy; 1.1.3 The dipole matrix; 1.1.3.1 Definition of the dipole matrix; 1.1.3.2 Symmetry of the dipole matrix; 1.1.3.3 The energy asymptotics for a body with a small void; 1.1.4 Dipole matrix for a 2D void in an infinite plane.…”
    Full text (MFA users only)
    Electronic eBook