Search Results - (((((((ant OR wwantin) OR semantic) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 37
- Data processing 37
- Mathematics 36
- Mathematical models 27
- Mathematical optimization 19
- Algorithms 17
- Machine learning 17
- Technological innovations 17
- artificial intelligence 17
- algorithms 15
- Data mining 14
- Computer science 13
- Information technology 12
- Artificial Intelligence 11
- Automatic control 10
- Design and construction 10
- Materials 10
- Computer networks 9
- Manufacturing processes 9
- Neural networks (Computer science) 9
- Computer algorithms 8
- Electric power systems 8
- Electromagnetism 8
- Engineering 8
- Management 8
- Big data 7
- Computational linguistics 7
- Data Mining 7
- Digital techniques 7
- Image processing 7
Search alternatives:
- wwantin »
-
441
A Primer on Machine Learning Applications in Civil Engineering
Published 2019Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- A Primer on Machine Learning Applications in Civil Engineering -- Author -- 1: Introduction -- 1.1 Machine Learning -- 1.2 Learning from Data -- 1.3 Research in Machine Learning: Recent Progress -- 1.4 Artificial Neural Networks -- 1.5 Fuzzy Logic (FL) -- 1.6 Genetic Algorithms -- 1.7 Support Vector Machine (SVM) -- 1.8 Hybrid Approach (HA) -- Bibliography -- 2: Artificial Neural Networks -- 2.1 Introduction to Fundamental Concepts and Terminologies -- 2.2 Evolution of Neural Networks -- 2.3 Models of ANN -- 2.4 McCulloch-Pitts Model -- 2.5 Hebb Network -- 2.6 Summary -- 2.7 Supervised Learning Network -- 2.7.1 Perceptron Network -- 2.7.2 Adaptive Linear Neuron -- 2.7.3 Back-Propagation Network -- 2.7.4 Radial Basis Function Network -- 2.7.5 Generalized Regression Neural Networks -- 2.7.6 Summary -- 2.8 Unsupervised Learning Networks -- 2.8.1 Introduction -- 2.8.2 Kohonen Self-Organizing Feature Maps -- 2.8.3 Counter Propagation Network -- 2.8.4 Adaptive Resonance Theory Network -- 2.8.5 Summary -- 2.9 Special Networks -- 2.9.1 Introduction -- 2.9.2 Gaussian Machine -- 2.9.3 Cauchy Machine -- 2.9.4 Probabilistic Neural Network -- 2.9.5 Cascade Correlation Neural Network -- 2.9.6 Cognitive Network -- 2.9.7 Cellular Neural Network -- 2.9.8 Optical Neural Network -- 2.9.9 Summary -- 2.10 Working Principle of ANN -- 2.10.1 Introduction -- 2.10.2 Types of Activation Function -- 2.10.3 ANN Architecture -- 2.10.4 Learning Process -- 2.10.5 Feed-Forward Back Propagation -- 2.10.6 Strengths of ANN -- 2.10.7 Weaknesses of ANN -- 2.10.8 Working of the Network -- 2.10.9 Summary -- Bibliography -- 3: Fuzzy Logic -- 3.1 Introduction to Classical Sets and Fuzzy Sets -- 3.1.1 Classical Sets -- 3.1.2 Fuzzy Sets -- 3.1.3 Summary.…”
Full text (MFA users only)
Electronic eBook -
442
Power system dynamics
Published 2013Table of Contents: “…18.1 Concept of Lyapunov Stability, Asymptotic Stability and Instability -- 18.2 Lyapunov's Asymptotic Stability Theorem -- References -- Chapter 19 Methods of Construction of Lyapunov Functions -- 19.1 Sylvester's Criteria for Definiteness and Semi-Definiteness -- 19.2 Construction of Lyapunov Functions for a Power System -- References -- Chapter 20 Generation of Lyapunov Functions -- 20.1 Energy Metric Algorithm for Generation of Lyapunov Functions -- 20.2 Application to Power System -- 20.3 Evaluation of Region of Asymptotic Stability -- 20.4 Application of Lyapunov Method to Linear System -- References -- Chapter 21 Exercise Problems -- 21.1 Problems with Solutions -- 21.2 Unsolved Problems -- References.…”
Full text (MFA users only)
Electronic eBook -
443
Poetry and Mind : Tractatus Poetico-Philosophicus
Published 2018Full text (MFA users only)
Electronic eBook -
444
-
445
Microwave and millimeter wave circuits and systems : emerging design, technologies, and applications
Published 2012Table of Contents: “…1.1.7 MBF Model -- the Memoryless PA Behavioural Model of ChoiceAcknowledgements; References; 2 Artificial Neural Network in Microwave Cavity Filter Tuning; 2.1 Introduction; 2.2 Artificial Neural Networks Filter Tuning; 2.2.1 The Inverse Model of the Filter; 2.2.2 Sequential Method; 2.2.3 Parallel Method; 2.2.4 Discussion on the ANN's Input Data; 2.3 Practical Implementation -- Tuning Experiments; 2.3.1 Sequential Method; 2.3.2 Parallel Method; 2.4 Influence of the Filter Characteristic Domain on Algorithm Efficiency; 2.5 Robots in the Microwave Filter Tuning; 2.6 Conclusions; Acknowledgement…”
Full text (MFA users only)
Electronic eBook -
446
Multi-dimensional Imaging.
Published 2014Table of Contents: “…10.2 Digital Holography 226 -- 10.3 Metal Nanoparticles 227 -- 10.4 Resolution Enhancement in Digital Holography 229 -- 10.5 Field of View Enhancement in Digital Holography 231 -- 10.6 Eliminating the DC Term and the Twin Images 233 -- 10.7 Additional Applications 235 -- Part III MULTI-DIMENSIONAL IMAGING AND DISPLAY -- 11 Three-Dimensional Integral Imaging and Display 243 / Manuel Martƒinez-Corral, Adriǹ Dorado, Anabel LLavador, Genaro Saavedra and Bahram Javidi -- 11.1 Introduction 243 -- 11.2 Basic Theory 245 -- 11.3 The Plenoptic Function 246 -- 11.4 Methods for the Capture of the Plenoptic Field 249 -- 11.5 Walking in Plenoptic Space 255 -- 11.6 Reconstruction of Intensity Distribution in Different Depth Planes 257 -- 11.7 Implementation of the Integral Imaging Display Device 261 -- 11.8 Conclusion 262 -- 12 Image Formats of Various 3-D Displays 267 / Jung-Young Son, Chun-Hea Lee, Wook-Ho Son, Min-Chul Park and Bahram Javidi -- 12.1 Chapter Overview 267 -- 12.2 Introduction 268 -- 12.3 Multiplexing Schemes 269 -- 12.4 Image Formats for 3-D Imaging 271 -- 13 Ray-based and Wavefront-based 3D Representations for Holographic Displays 303 / Masahiro Yamaguchi and Koki Wakunami -- 13.1 Introduction 303 -- 13.2 Ray-based and Wavefront-based 3D Displays 303 -- 13.3 Conversion between Ray-based and Wavefront 3D Representations 307 -- 13.4 Hologram Printer Based on a Full-Parallax Holographic Stereogram 308 -- 13.5 Computational Holography Using a Ray-Sampling Plane 310 -- 13.6 Occlusion Culling for Computational Holography Using the Ray-Sampling Plane 313 -- 13.7 Scanning Vertical Camera Array for Computational Holography 315 -- 13.8 Conclusion and Future Issues 323 -- 14 Rigorous Diffraction Theory for 360 Computer-Generated Holograms 327 / Toyohiko Yatagai, Yusuke Sando and Boaz Jessie Jackin -- 14.1 Introduction 327 -- 14.2 Three-Dimensional Object and Its Diffracted Wavefront 328 -- 14.3 Point-Spread Function Approach for Spherical Holography 333 -- 14.4 Rigorous Point-Spread Function Approach 336.…”
Full text (MFA users only)
Electronic eBook -
447
D Cookbook.
Published 2014Table of Contents: “…Performing type conversionsFinding the largest files in a directory; Creating a network client and server; Using Base64 to create a data URI; Generating random numbers; Normalizing a string and performing Unicode comparisons; Searching with regular expressions; Writing a digest utility; Using std.zlib compression; Using the std.json module; Chapter 3: Ranges; Introduction; Using ranges when implementing an algorithm; Creating an input range; Creating an output range; Creating a higher-order range; Putting a range interface on a collection; Creating an input range over a tree structure…”
Full text (MFA users only)
Electronic eBook -
448
CCNA Security Study Guide : Exam 210-260.
Published 2018Table of Contents: “…-- Certification Exam Policies -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Understanding Security Fundamentals -- Goals of Security -- Network Topologies -- Common Network Security Zones -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Understanding Security Threats -- Common Network Attacks -- Social Engineering -- Malware -- Data Loss and Exfiltration -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Understanding Cryptography -- Symmetric and Asymmetric Encryption -- Hashing Algorithms -- Key Exchange -- Public Key Infrastructure -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Securing the Routing Process -- Securing Router Access -- Implementing OSPF Routing Update Authentication -- Securing the Control Plane -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Understanding Layer 2 Attacks -- Understanding STP Attacks -- Understanding ARP Attacks -- Understanding MAC Attacks -- Understanding CAM Overflows -- Understanding CDP/LLDP Reconnaissance -- Understanding VLAN Hopping -- Understanding DHCP Spoofing -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Preventing Layer 2 Attacks -- Configuring DHCP Snooping -- Configuring Dynamic ARP Inspection -- Configuring Port Security -- Configuring STP Security Features -- Disabling DTP -- Verifying Mitigations -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 VLAN Security -- Native VLANs -- PVLANs -- ACLs on Switches -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Securing Management Traffic.…”
Full text (MFA users only)
Electronic eBook -
449
Contemporary Ergonomics 1998.
Published 1998Table of Contents: “…Development of a questionnaire to measure attitudes towards virtual reality -- Orientation of blind users on the World Wide Web -- F̃lash, splash and crash:̃ Human factors and the implementation of innovative Web technologies -- Determining ergonomic factors in stress from work demands of nurses -- A risk assessment and control cycle approach to managing workplace stress -- Teleworking: Assessing the risks -- Evaluating teleworking -- case study -- Team organisational mental models: an integrative framework for research -- The impact of ITT on virtual team working in the European automotive industry -- The effect of communication processes upon workers and job efficiency -- A case study of job design in a steel plant -- The effects of age and habitual physical activity on the adjustment to nocturnal shiftwork -- Job design for university technicians: work activity and allocation of function -- Allocation of functions and manufacturing job design based on knowledge requirements -- The need to specify cognition within system requirements -- Analysis of complex communication tasks -- Health and safety as the basis for specifying information systems design requirements -- Cognitive algorithms -- Rapid prototyping in foam of 3D anthropometric computer models in functional postures -- The use of high and low level prototyping methods for product user interfaces -- Creative collaboration in engineering design teams -- Pleasure and product semantics -- A survey of usability practice and needs in Europe -- Cultural influence in usability assessment -- Interface display designs based on operator knowledge requirements -- Understanding what makes icons effective: how subjective ratings can inform design -- Representing uncertainty in decision support systems: the state of the art.…”
Full text (MFA users only)
Electronic eBook -
450
Pediatric incontinence : evaluation and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
451
Knowledge mining using intelligent agents
Published 2011Full text (MFA users only)
Electronic eBook -
452
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
453
Quasicrystals : a primer
Published 1997Table of Contents: “…Cover; Contents; 1 How to fill with atoms in condensed matter states; 1.1 Introduction; 1.2 Periodic structures; 1.2.1 Lattices, cells, bases, and space groups; 1.2.2 Atomic planes, rows, and indices; 1.2.3 The reciprocal lattice; 1.2.4 Experimental determination of crystal structures; 1.2.5 The notion of forbidden symmetries; 1.3 Liquids, glasses, and amorphous alloys; 1.3.1 Description of 'disordered' systems; 1.3.2 Diffraction with disordered systems; 1.4 Quasiperiodicity: another type of long-range order; 1.4.1 A one-dimensional example of non-periodic long-range order.…”
Full text (MFA users only)
Electronic eBook -
454
Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture
Published 2019Table of Contents: “…The Digitalization of Cultural Policies in France 149; Anne BELLON 14.1.…”
Full text (MFA users only)
Electronic eBook -
455
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
456
Theoretical Computer Science : Proceedings of the 10th Italian Conference on ICTCS '07.
Published 2007Full text (MFA users only)
Electronic eBook -
457
Sound waves : propagation, frequencies, and effects
Published 2012Table of Contents: “…CASE STUDIES -- 6. GENETIC ALGORITHM -- 7. RESULTS AND DISCUSSION -- 7.1. Results -- 7.1.1. …”
Full text (MFA users only)
Electronic eBook -
458
Stochastic filtering with applications in finance
Published 2010Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
Full text (MFA users only)
Electronic eBook -
459
Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization
Published 2019Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
Full text (MFA users only)
Electronic eBook -
460
Structural Engineering, Vibration and Aerospace Engineering II
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook