Search Results - (((((((ant OR wind) OR mantic) OR win) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 30
- Data processing 25
- Mathematics 24
- Mathematical models 22
- Algorithms 19
- Mathematical optimization 19
- algorithms 18
- artificial intelligence 17
- Technological innovations 16
- Information technology 15
- Machine learning 15
- Management 14
- Data mining 13
- Computer algorithms 12
- Big data 11
- Artificial Intelligence 10
- Computer networks 10
- Design and construction 9
- Social aspects 9
- Mechatronics 8
- Neural networks (Computer science) 8
- Research 8
- Automatic control 7
- Bioinformatics 7
- Computer programming 7
- Electric power systems 7
- History 7
- Manufacturing processes 7
- Wireless communication systems 7
- Computer science 6
Search alternatives:
- ant »
- mantic »
- cantor »
- wind »
- win »
-
261
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook -
262
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
263
Applied mechanics and manufacturing technology : selected, peer reviewed papers of the 2011 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2011),...
Published 2011Table of Contents: “…Multiobjective Optimization of Hybrid Electrical Vehicle Powertrain Mounting System Using Hybrid Genetic AlgorithmMechanical Properties and Reinforcement Mechanism of Amorphous Particles Reinforced Aluminum Matrix Composites; Error Analysis Model of Aircraft Multi-Joint Assembly Based on Linkage Mechanism Theory; Layup Analyzing of a Carbon/Glass Hybrid Composite Wind Turbine Blade Using Finite Element Analysis; Analysis of A/C Double Angular Milling Head's Performance; Analysis on the Thermal Error Compensation Model of Direct-Drive A/C Bi-Rotary Milling Head.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
264
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
265
Measurement technology and its application III : selected, peer reviewed papers from the 2014 3rd International Conference on Measurement, Instrumentation and Automation (ICMIA 201...
Published 2014Table of Contents: “…The Displacement Measurement of Ground Wind Loads for Launch VehicleThe Relations between UT1 Precision and Radio Source Sky-Coverage; The Research of GPS Elevation Fitting Considering the Influence of Covariance Function; Enabling Standardization in Shear Bond Strength Tests for Orthodontic Adhesives on Natural Teeth by Using an Innovative Grip Accessory for the Testing Machine; Knock Detection and Evaluation of Kerosene Piston Engine; Correction of the Popular Bias Test Method Recommended by ISO/TS16949 for Manufacturing Industries.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
266
Mechanical, Electronic and Information Technology Engineering
Published 2015Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
267
Advanced Analytics with R and Tableau.
Published 2016Table of Contents: “…; How to do Clustering in Tableau; Creating Clusters; Clustering example in Tableau; Creating a Tableau group from cluster results; Constraints on saving Clusters; Interpreting your results; How Clustering Works in Tableau; The clustering algorithm; Scaling; Clustering without using k-means; Hierarchical modeling; Statistics for Clustering; Describing Clusters -- Summary tab; Testing your Clustering.…”
Full text (MFA users only)
Electronic eBook -
268
Towards 5G : Applications, Requirements and Candidate Technologies.
Published 2016Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
Full text (MFA users only)
Electronic eBook -
269
Power system wide-area stability analysis and control
Published 2018Full text (MFA users only)
Electronic eBook -
270
-
271
Lead generation for dummies
Published 2014Table of Contents: “…Creating an Internal Blogging ProgramChapter 9: Creating Lasting Relationships Through Social Media; Sharing on Social Media; Getting the Most out of Facebook; Leveraging Twitter; Engaging Through LinkedIn; Building Your Google+ Presence; Getting Visual with Pinterest; Attracting Attention with SlideShare; Chapter 10: Getting Found Through Search Engine Optimization; Maximizing Different Traffic Sources; Knowing Your Search Engines; Making the Most out of Google Algorithm Updates; Choosing Your Keywords; Perfecting On-Page SEO; Utilizing Links in a Natural Way.…”
Full text (MFA users only)
Electronic eBook -
272
Topology '90
Published 1992Table of Contents: “…(p-1)/2Tangles in Prisms, Tangles in Cobordisms -- A Computational Algorithm of Spectral Flow in Floer Homology…”
Full text (MFA users only)
Electronic eBook -
273
Global optimization methods in geophysical inversion
Published 2013Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
Full text (MFA users only)
Electronic eBook -
274
Limits, Limits Everywhere : the Tools of Mathematical Analysis
Published 2012Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
Full text (MFA users only)
Electronic eBook -
275
Legitimate applications of peer to peer networks
Published 2004Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
Full text (MFA users only)
Electronic eBook -
276
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
277
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
278
Current development of mechanical engineering and energy : selected, peer reviewed papers from the 2013 International Symposium on Vehicle, Mechanical, and Electrical Engineering (...
Published 2014Table of Contents: “…Simulation and Study on Ride Comfort of Articulated Dump Truck Based on Rigid-Flex CouplingThe Hall Automotive Wheel Speed Sensor and Simulation for its Signal Processing; Wind-Induced Vibration of the Rear-View Mirrors of Car at High Speed; Research on the Affection of Vehicle Lateral Stability Related to the Improved ABS; The Quantification Research of Engine Body Defect that Tested by Ultrasonic Phased Array; Analysis of Vehicle Interior Low-Frequency Noise Based on ATV; The Engine Oil Sump Radiated Noise Optimization Design; A Novel OFDM Radar Algorithm in Vehicular Environment…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
279
-
280
Linear drives for industry applications IX : selected, peer reviewed papers from the 9th International Conference on Linear Drives for Industry Applications (LDIA 2013), July 7-10,...
Published 2013Table of Contents: “…Intro -- Linear Drives for Industry Applications IX -- Preface, Committees and Reviewers -- Table of Contents -- Chapter 1: Linear Motors and Other Electrical Machines -- Design and Analysis of a New Linear Fault-Tolerant Flux-Reversal Permanent-Magnet Machine -- Design of Dual-Rotor Radial Flux Permanent-Magnet Generator for Wind Power Applications -- Inductance and Flux Linkage Variation on Operation Performance for Multi-Segmented Linear PM Motor -- An Optimal Method for Minimizing Cogging Torque in Disc-Type Permanent Magnet Machines Using FEM and Genetic Algorithm -- Research on the End Effect Detent Force Reduction of Permanent Magnet Linear Synchronous Motor with Auxiliary Poles One-Piece Structure -- Performance Analysis of a Linear Motor with HTS Bulk Magnets for Driving a Prototype HTS Maglev Vehicle -- Design of a New Frog-Leg Winding Permanent-Magnet Brushless DC Motor -- Magnetic Shielding for Coreless Linear Permanent Magnet Motors -- Design and Experiment Analysis of Induction Machine Used in the Economical EV -- An Exact Analytical Solution of Halbach Arrays Permanent-Magnet Motor for Magnetic Field on Load -- Analysis, Design and Prototyping of a Low-Speed High-Torque Six-Phase Fault-Tolerant Permanent Magnet Synchronous Machine for EVs -- Investigation of a Single-Phase Oscillating PM Alternator for Free-Piston Stirling Engines -- Punching Machine Driver Research Based on Pulse Electromagnetic Force Actuator -- Characteristic Analysis of Moving Magnet Type Double-Sided Linear Synchronous Motor -- Gravity Neighborhood Estimation Algorithm Based for Cylinder Linear Motor Parameter Optimization -- Copper Losses and Rotor Losses Calculation for the BLDCM Used in a Flywheel Energy Storage System -- Optimal Design of a Double-Sided Permanent Magnet Linear Synchronous Motor for Ropeless Elevator System.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook