Search Results - (((((((ant OR wkant) OR mkantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 42
- Mathematics 39
- Mathematical models 35
- Mathematical optimization 26
- artificial intelligence 26
- Machine learning 25
- Algorithms 24
- algorithms 21
- Social aspects 18
- Artificial Intelligence 17
- Technological innovations 17
- Computer networks 16
- Data mining 16
- History 14
- Computer algorithms 13
- Digital techniques 12
- Information technology 12
- Research 12
- Statistical methods 12
- methods 12
- Design and construction 11
- Image processing 11
- Python (Computer program language) 11
- Development 10
- Engineering 10
- Neural networks (Computer science) 10
- Application software 9
- Automation 9
- Big data 9
Search alternatives:
- ant »
- wkant »
- mkantis »
- cantor »
-
381
-
382
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
383
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…An extended branch-and-bound algorithm for fuzzy linear bilevel programming / G. …”
Full text (MFA users only)
Electronic eBook -
384
Automatic indexing and abstracting of document texts
Published 2000Full text (MFA users only)
Electronic eBook -
385
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
386
Fast finance : does the financial world allow social loafing?
Published 2014Full text (MFA users only)
Electronic eBook -
387
-
388
Mechanical and electrical technology VI : selected, peer reviewed papers from the 2014 6 th International Conference on Mechanical and Electrical Technology (ICMET 2014), July 17-1...
Published 2014Table of Contents: “…Mechanical and Electrical Technology VI; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Thermal and Mechanical Research, General Mechanical Engineering; Prediction the Springback in Air-Bending Process Using Neural Network Metamodel; Dynamic Equilibrium Configurations of Multibody Systems; Wear Behaviour of Stellite 6 Coatings Produced on an Austenitic Stainless Steel Substrate by Laser Cladding Using Two Different Heat Inputs; Influence of Pipe Diameters on Shapes of Air Taylor Bubbles in Small Pipes Containing Stagnant Water…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
389
Fundamentals of patenting and licensing for scientists and engineers
Published 2009Table of Contents: “…When final rejection is received. 8.9. Appeal. 8.10. …”
Full text (MFA users only)
Electronic eBook -
390
Understanding large temporal networks and spatial networks : exploration, pattern searching, visualization and network evolution
Published 2014Table of Contents: “…Spanish Algorithms -- 3.8.4.A Sparse Network Algorithm -- 3.9. …”
Full text (MFA users only)
Electronic eBook -
391
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?…”
Full text (MFA users only)
Electronic eBook -
392
Advanced design and manufacturing technology I
Published 2011Table of Contents: “…Preface -- Technology and Characteristic of Wool Ring Spun Compound Yarn -- A Co-Evolutionary Contract Net-Based Framework for Distributed Manufacturing Execution Systems -- The Research on Cutting Force in High-Speed Milling Process of Aluminum Alloy Impeller -- Research of Asynchronous Multi-Type Sensors Data Fusion -- Researcher of Region Growing Medical Image Segmentation Based on Adaboost Algorithm -- Trail Investigation on Chip of High-Speed and Dry Cutting on Hardened Steel with PCBN Tool -- Simulate Measure for Spring Back of Autobody Panel's Edge -- Reconfigurable Clamping Device Based on Memory Alloy, Orientation Disc, Majority Column and Telescopic Pole -- Analysis of Mechanical Characteristics and Structural Options of Micro-Milling Cutter -- Study on Predictive Control of Ship Steering Gear System -- Research of Hydroforming Technology for Special-Shaped Cross-Section Pipe -- Design of CNC Grinding Machine Especially for C.V Joint Inner Race Spherical Raceway Processing -- Passivation of the Fe-Based Bulk Amorphous Alloy in HCl Solution -- Simulation of Temperature Field during 7022 Al Alloy Friction Stir Welding process Based on Dual-Source -- Study on Al-4.5Cu-3Ce Alloy Semi-Solid Slurry Prepared by Slope Vibration Casting -- Precision Control Research on DACS-Based Modern Digital Shipbuilding Technology -- Contact Stress Analysis of NCD Coating on Roll Ball of Ball Bearing -- Low Cycling Thermal Fatigue of Large-Scale Marine Diesel Engine Piston -- Study on Remote Monitoring and Control System for Construction Vehicle -- Research on New Structural Quay Container Crane -- Study on the Microstructure and Properties of Suspensory Wire in DVD CD-ROM Head -- Investigation of the Precipitation in Mg-Zr Alloys -- The Optimization of Cutting Parameter of Machining the Small Diameter Deep Hole on Austenitic Stainless Steel -- An Analysis of Drawing Process in Stamping Die Design for the Wheel Hub -- Effects of Residual Stress on Interfacial Bonding Strength of Zinc-Plated Film -- Friction and Wear of Polished Single Crystal Silicon at Different Area -- Numerical Simulation of the Machining Distortion of Aircraft Aluminum Part Caused by Redistribution of Residual Stress -- Study on Fuzzy D-S Evidence Theory Mathematics Foundation Based on the Form Prototype -- Study on the Influence of Internal Flow Field in Pipeline Elbow by the Guide Plate -- Research on Electrical Resistively of Wood Dust -- Primary Research of Bionic Design on Tools with Mouthpart of Larvae Long Horned Beetles -- Adsorption Analysis of Cr(VI) by Fly Ash Composite Material in Aqueous Medium -- Research of Controlling Heat Treatment Deformation for Powder Metallurgy Mechanical Structural Parts -- Influence of Vacuum Heat Treatment on Sintered W-Cu Alloy Performances -- Design on Numerical Control System of Glass Cutting Machine Based on PC -- Fast Frequency Hopping Signal Generator Based on DDS -- The Optimization of Material Thickness for Neutron Shielding with Monte Carlo Method -- A Method to Measure Rotary Speed and Torque Using JC Sensors -- Different Evaluation Approaches of Confusion Network in Chinese Spoken Classification -- Study on Mine-Used Battery Locomotive Charging System -- Steel Wire Rope Section Damage Detection System Based on Wavelet Multi-Resolution Analysis -- Three-Level SVPWM Controller Design Based on FPGA -- Phase Error Immunity Optical Measurement System -- A Stable Least Squares Ellipses Fitting Algorithm Based on Zernike Moments -- Accuracy Verification Method about Optical Three-Dimensional Measuring Instrument -- Contrast Research on Cutting Forces in 4-Axis and 5-Axis Blade Machining Process -- A Method to Center Extraction of Reference Point Algorithm in Reverse Engineering -- Optimal Design of Flexible Manufacturing System Based on Optical Measurement Principle -- Material Removal for Modal Effect on Impeller Blades by Finite Element Analysis -- Rotation Inertia Measurement Device Design of Winged Rigid Body Based on TRIZ Conflict Resolving Matrix -- Development of NC System of the 3-PUU Parallel Machine Tool Based on PMAC -- Finite Element Analysis and Dynamic Testing for Hard Gear Cutting by Gear Hobbing Machine -- Design and Stimulation of Hydraulic Servo System for Vehicle Test Equipment for Rubber Shock Absorber -- Research on Chip Breaking Mechanism of High-Temperature and High-Strength Steel 2.25Cr-1Mo-0.25V -- Research on the Machinability of Hydrogenated Cylindrical Shell Materials (2.25 Cr-1Mo-0.25V Steel) -- Applied Research of the Electric Spindle Technology on Sub-Nanometer Crusher with Cellulosine -- High-Speed Milling Toolpath Planning for Aviation Engines Impeller Using POWERMILL Software -- Finite Element Analysis of Cold Extrusion Combination Mold Interference Fit -- Coagulant Prepared by Gangue and its Application in Treatment of Coal Washing Wastewater -- Development and Oxidation of RexOy-Modified Aluminide Coating -- Design and Research on Two-Degree of Freedom Spherical Gear -- An Algorithm for Computation of Radial-Harmonic-Fourier Moments -- Applied Research on Synesthesia Theory in Industrial Design.…”
Full text (MFA users only)
Electronic eBook -
393
Advances in portfolio construction and implementation
Published 2003Full text (MFA users only)
Electronic eBook -
394
A Primer on Machine Learning Applications in Civil Engineering
Published 2019Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- A Primer on Machine Learning Applications in Civil Engineering -- Author -- 1: Introduction -- 1.1 Machine Learning -- 1.2 Learning from Data -- 1.3 Research in Machine Learning: Recent Progress -- 1.4 Artificial Neural Networks -- 1.5 Fuzzy Logic (FL) -- 1.6 Genetic Algorithms -- 1.7 Support Vector Machine (SVM) -- 1.8 Hybrid Approach (HA) -- Bibliography -- 2: Artificial Neural Networks -- 2.1 Introduction to Fundamental Concepts and Terminologies -- 2.2 Evolution of Neural Networks -- 2.3 Models of ANN -- 2.4 McCulloch-Pitts Model -- 2.5 Hebb Network -- 2.6 Summary -- 2.7 Supervised Learning Network -- 2.7.1 Perceptron Network -- 2.7.2 Adaptive Linear Neuron -- 2.7.3 Back-Propagation Network -- 2.7.4 Radial Basis Function Network -- 2.7.5 Generalized Regression Neural Networks -- 2.7.6 Summary -- 2.8 Unsupervised Learning Networks -- 2.8.1 Introduction -- 2.8.2 Kohonen Self-Organizing Feature Maps -- 2.8.3 Counter Propagation Network -- 2.8.4 Adaptive Resonance Theory Network -- 2.8.5 Summary -- 2.9 Special Networks -- 2.9.1 Introduction -- 2.9.2 Gaussian Machine -- 2.9.3 Cauchy Machine -- 2.9.4 Probabilistic Neural Network -- 2.9.5 Cascade Correlation Neural Network -- 2.9.6 Cognitive Network -- 2.9.7 Cellular Neural Network -- 2.9.8 Optical Neural Network -- 2.9.9 Summary -- 2.10 Working Principle of ANN -- 2.10.1 Introduction -- 2.10.2 Types of Activation Function -- 2.10.3 ANN Architecture -- 2.10.4 Learning Process -- 2.10.5 Feed-Forward Back Propagation -- 2.10.6 Strengths of ANN -- 2.10.7 Weaknesses of ANN -- 2.10.8 Working of the Network -- 2.10.9 Summary -- Bibliography -- 3: Fuzzy Logic -- 3.1 Introduction to Classical Sets and Fuzzy Sets -- 3.1.1 Classical Sets -- 3.1.2 Fuzzy Sets -- 3.1.3 Summary.…”
Full text (MFA users only)
Electronic eBook -
395
Practical Strategies in Geriatric Mental Health : Cases and Approaches.
Published 2019Full text (MFA users only)
Electronic eBook -
396
Data mining for the social sciences : an introduction
Published 2015Full text (MFA users only)
Electronic eBook -
397
Handbook for pandemic and mass-casualty planning and response
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
398
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook -
399
Machine learning for the web
Published 2016Table of Contents: “…Preface; Introduction to Practical Machine Learning Using Python; General machine-learning concepts; Machine-learning example; Installing and importing a module (library); Preparing, manipulating and visualizing data -- NumPy, pandas and matplotlib tutorials; Using NumPy; Arrays creation; Array manipulations; Array operations; Linear algebra operations; Statistics and mathematical functions; Understanding the pandas module; Exploring data; Manipulate data; Matplotlib tutorial; Scientific libraries used in the book; When to use machine learning; Summary; Unsupervised Machine Learning.…”
Full text (MFA users only)
Electronic eBook -
400
Test driven development in Ruby : a practical introduction to TDD using problem and solution domain analysis
Published 2017Table of Contents: “…Problem Domain AnalysisSolution Domain Analysis; Alternative Representations; Divide and Conquer Strategy; Designing Test Cases; Sum a List of Numbers; Sequence of Test Cases; Starter Test; Next Test ; Story Test ; Assertion; Test Driving Calculator; Canonical Test Structure; Given; When; Then; Arrange, Act, Assert; Calculator; Addition; Subtraction; Common Mistakes; Common Mistakes in the TDD Cycle; Mistakes in Step One; Mistakes in Step Two; Mistakes in Step Three; Mistakes in Step Four; Mistakes in Step Five; Base Conversion; Problem Statement; Problem Domain Analysis.…”
Full text (MFA users only)
Electronic eBook