Search Results - (((((((ant OR wyant) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 42
- Mathematics 39
- Mathematical models 36
- Mathematical optimization 26
- artificial intelligence 26
- Machine learning 25
- Algorithms 24
- algorithms 21
- Social aspects 18
- Artificial Intelligence 17
- Technological innovations 17
- Computer networks 16
- Data mining 16
- History 14
- Computer algorithms 13
- methods 13
- Digital techniques 12
- Information technology 12
- Research 12
- Statistical methods 12
- Design and construction 11
- Image processing 11
- Python (Computer program language) 11
- Development 10
- Engineering 10
- Neural networks (Computer science) 10
- Application software 9
- Automation 9
- Big data 9
Search alternatives:
- ant »
- wyant »
- mantis »
- cantor »
-
381
Image processing and jump regression analysis
Published 2005Table of Contents: “…Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Images and image representation -- 1.2 Regression curves and sugaces with jumps -- 1.3 Edge detection, image restoration, and jump regression analysis -- 1.4 Statistical process control and some other related topics -- 1.5 Organization of the book -- Problems -- 2 Basic Statistical Concepts and Conventional Smoothing Techniques -- 2.1 Introduction -- 2.2 Some basic statistical concepts and terminologies -- 2.2.1 Populations, samples, and distributions -- 2.2.2 Point estimation of population parameters -- 2.2.3 Confidence intervals and hypothesis testing -- 2.2.4 Maximum likelihood estimation and least squares estimation -- 2.3 Nadaraya- Watson and other kernel smoothing techniques -- 2.3.1 Univariate kernel estimators -- 2.3.2 Some statistical properties of kernel estimators -- 2.3.3 Multivariate kernel estimators -- 2.4 Local polynomial kernel smoothing techniques -- 2.4.1 Univariate local polynomial kernel estimators -- 2.4.2 Some statistical properties -- 2.4.3 Multivariate local polynomial kernel estimators -- 2.4.4 Bandwidth selection -- 2.5 Spline smoothing procedures -- 2.5.1 Univariate smoothing spline estimation -- 2.5.2 Selection of the smoothing parameter -- 2.5.3 Multivariate smoothing spline estimation -- 2.5.4 Regression spline estimation -- 2.6 Wavelet transformation methods -- 2.6.1 Function estimation based on Fourier transformation -- 2.6.2 Univariate wavelet transformations -- 2.6.3 Bivariate wavelet transformations -- Problems -- 3 Estimation of Jump Regression Curves -- 3.1 Introduction -- 3.2 Jump detection when the number of jumps is known -- 3.2.1 Difference kernel estimation procedures -- 3.2.2 Jump detection based on local linear kernel smoothing -- 3.2.3 Estimation of jump regression functions based on semiparametric modeling -- 3.2.4 Estimation of jump regression functions by spline smoothing -- 3.2.5 Jump and cusp detection by wavelet transformations -- 3.3 Jump estimation when the number of jumps is unknown -- 3.3.1 Jump detection by comparing three local estimators -- 3.3.2 Estimation of the number of jumps by a sequence of hypothesis tests -- 3.3.3 Jump detection by DAKE -- 3.3.4 Jump detection by local polynomial regression -- 3.4 Jump-preserving curve estimation -- 3.4.1 Jump curve estimation by split linear smoothing -- 3.4.2 Jump-preserving curve fitting based on local piecewise-linear kernel estimation -- 3.4.3 Jump-preserving smoothers based on robust estimation -- 3.5 Some discussions -- Problems -- 4 Estimation of Jump Location Curves of Regression Surfaces -- 4.1 Introduction -- 4.2 Jump detection when the number of jump location curves is known -- 4.2.1 Jump detection by RDKE -- 4.2.2 Minimax edge detection -- 4.2.3 Jump estimation based on a contrast statistic -- 4.2.4 Algorithms for tracking the JLCs -- 4.2.5 Estimation of JLCs by wavelet transformations -- 4.3 Detection of arbitrary jumps by local smoothing -- 4.3.1 Treat JLCs as a pointset in the design space -- 4.3.2 Jump detection by local linear estimation -- 4.3.3 Two modijication procedures -- 4.4 Jump detection in two or more given directions -- 4.4.1 Jump detection in two given directions -- 4.4.2 Measuring the p.…”
Full text (MFA users only)
Electronic eBook -
382
-
383
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
384
Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference.
Published 2006Table of Contents: “…An extended branch-and-bound algorithm for fuzzy linear bilevel programming / G. …”
Full text (MFA users only)
Electronic eBook -
385
Automatic indexing and abstracting of document texts
Published 2000Full text (MFA users only)
Electronic eBook -
386
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
387
Fast finance : does the financial world allow social loafing?
Published 2014Full text (MFA users only)
Electronic eBook -
388
-
389
Mechanical and electrical technology VI : selected, peer reviewed papers from the 2014 6 th International Conference on Mechanical and Electrical Technology (ICMET 2014), July 17-1...
Published 2014Table of Contents: “…Mechanical and Electrical Technology VI; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Thermal and Mechanical Research, General Mechanical Engineering; Prediction the Springback in Air-Bending Process Using Neural Network Metamodel; Dynamic Equilibrium Configurations of Multibody Systems; Wear Behaviour of Stellite 6 Coatings Produced on an Austenitic Stainless Steel Substrate by Laser Cladding Using Two Different Heat Inputs; Influence of Pipe Diameters on Shapes of Air Taylor Bubbles in Small Pipes Containing Stagnant Water…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
390
Fundamentals of patenting and licensing for scientists and engineers
Published 2009Table of Contents: “…When final rejection is received. 8.9. Appeal. 8.10. …”
Full text (MFA users only)
Electronic eBook -
391
Understanding large temporal networks and spatial networks : exploration, pattern searching, visualization and network evolution
Published 2014Table of Contents: “…Spanish Algorithms -- 3.8.4.A Sparse Network Algorithm -- 3.9. …”
Full text (MFA users only)
Electronic eBook -
392
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?…”
Full text (MFA users only)
Electronic eBook -
393
Advanced design and manufacturing technology I
Published 2011Table of Contents: “…Preface -- Technology and Characteristic of Wool Ring Spun Compound Yarn -- A Co-Evolutionary Contract Net-Based Framework for Distributed Manufacturing Execution Systems -- The Research on Cutting Force in High-Speed Milling Process of Aluminum Alloy Impeller -- Research of Asynchronous Multi-Type Sensors Data Fusion -- Researcher of Region Growing Medical Image Segmentation Based on Adaboost Algorithm -- Trail Investigation on Chip of High-Speed and Dry Cutting on Hardened Steel with PCBN Tool -- Simulate Measure for Spring Back of Autobody Panel's Edge -- Reconfigurable Clamping Device Based on Memory Alloy, Orientation Disc, Majority Column and Telescopic Pole -- Analysis of Mechanical Characteristics and Structural Options of Micro-Milling Cutter -- Study on Predictive Control of Ship Steering Gear System -- Research of Hydroforming Technology for Special-Shaped Cross-Section Pipe -- Design of CNC Grinding Machine Especially for C.V Joint Inner Race Spherical Raceway Processing -- Passivation of the Fe-Based Bulk Amorphous Alloy in HCl Solution -- Simulation of Temperature Field during 7022 Al Alloy Friction Stir Welding process Based on Dual-Source -- Study on Al-4.5Cu-3Ce Alloy Semi-Solid Slurry Prepared by Slope Vibration Casting -- Precision Control Research on DACS-Based Modern Digital Shipbuilding Technology -- Contact Stress Analysis of NCD Coating on Roll Ball of Ball Bearing -- Low Cycling Thermal Fatigue of Large-Scale Marine Diesel Engine Piston -- Study on Remote Monitoring and Control System for Construction Vehicle -- Research on New Structural Quay Container Crane -- Study on the Microstructure and Properties of Suspensory Wire in DVD CD-ROM Head -- Investigation of the Precipitation in Mg-Zr Alloys -- The Optimization of Cutting Parameter of Machining the Small Diameter Deep Hole on Austenitic Stainless Steel -- An Analysis of Drawing Process in Stamping Die Design for the Wheel Hub -- Effects of Residual Stress on Interfacial Bonding Strength of Zinc-Plated Film -- Friction and Wear of Polished Single Crystal Silicon at Different Area -- Numerical Simulation of the Machining Distortion of Aircraft Aluminum Part Caused by Redistribution of Residual Stress -- Study on Fuzzy D-S Evidence Theory Mathematics Foundation Based on the Form Prototype -- Study on the Influence of Internal Flow Field in Pipeline Elbow by the Guide Plate -- Research on Electrical Resistively of Wood Dust -- Primary Research of Bionic Design on Tools with Mouthpart of Larvae Long Horned Beetles -- Adsorption Analysis of Cr(VI) by Fly Ash Composite Material in Aqueous Medium -- Research of Controlling Heat Treatment Deformation for Powder Metallurgy Mechanical Structural Parts -- Influence of Vacuum Heat Treatment on Sintered W-Cu Alloy Performances -- Design on Numerical Control System of Glass Cutting Machine Based on PC -- Fast Frequency Hopping Signal Generator Based on DDS -- The Optimization of Material Thickness for Neutron Shielding with Monte Carlo Method -- A Method to Measure Rotary Speed and Torque Using JC Sensors -- Different Evaluation Approaches of Confusion Network in Chinese Spoken Classification -- Study on Mine-Used Battery Locomotive Charging System -- Steel Wire Rope Section Damage Detection System Based on Wavelet Multi-Resolution Analysis -- Three-Level SVPWM Controller Design Based on FPGA -- Phase Error Immunity Optical Measurement System -- A Stable Least Squares Ellipses Fitting Algorithm Based on Zernike Moments -- Accuracy Verification Method about Optical Three-Dimensional Measuring Instrument -- Contrast Research on Cutting Forces in 4-Axis and 5-Axis Blade Machining Process -- A Method to Center Extraction of Reference Point Algorithm in Reverse Engineering -- Optimal Design of Flexible Manufacturing System Based on Optical Measurement Principle -- Material Removal for Modal Effect on Impeller Blades by Finite Element Analysis -- Rotation Inertia Measurement Device Design of Winged Rigid Body Based on TRIZ Conflict Resolving Matrix -- Development of NC System of the 3-PUU Parallel Machine Tool Based on PMAC -- Finite Element Analysis and Dynamic Testing for Hard Gear Cutting by Gear Hobbing Machine -- Design and Stimulation of Hydraulic Servo System for Vehicle Test Equipment for Rubber Shock Absorber -- Research on Chip Breaking Mechanism of High-Temperature and High-Strength Steel 2.25Cr-1Mo-0.25V -- Research on the Machinability of Hydrogenated Cylindrical Shell Materials (2.25 Cr-1Mo-0.25V Steel) -- Applied Research of the Electric Spindle Technology on Sub-Nanometer Crusher with Cellulosine -- High-Speed Milling Toolpath Planning for Aviation Engines Impeller Using POWERMILL Software -- Finite Element Analysis of Cold Extrusion Combination Mold Interference Fit -- Coagulant Prepared by Gangue and its Application in Treatment of Coal Washing Wastewater -- Development and Oxidation of RexOy-Modified Aluminide Coating -- Design and Research on Two-Degree of Freedom Spherical Gear -- An Algorithm for Computation of Radial-Harmonic-Fourier Moments -- Applied Research on Synesthesia Theory in Industrial Design.…”
Full text (MFA users only)
Electronic eBook -
394
Advances in portfolio construction and implementation
Published 2003Full text (MFA users only)
Electronic eBook -
395
A Primer on Machine Learning Applications in Civil Engineering
Published 2019Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- A Primer on Machine Learning Applications in Civil Engineering -- Author -- 1: Introduction -- 1.1 Machine Learning -- 1.2 Learning from Data -- 1.3 Research in Machine Learning: Recent Progress -- 1.4 Artificial Neural Networks -- 1.5 Fuzzy Logic (FL) -- 1.6 Genetic Algorithms -- 1.7 Support Vector Machine (SVM) -- 1.8 Hybrid Approach (HA) -- Bibliography -- 2: Artificial Neural Networks -- 2.1 Introduction to Fundamental Concepts and Terminologies -- 2.2 Evolution of Neural Networks -- 2.3 Models of ANN -- 2.4 McCulloch-Pitts Model -- 2.5 Hebb Network -- 2.6 Summary -- 2.7 Supervised Learning Network -- 2.7.1 Perceptron Network -- 2.7.2 Adaptive Linear Neuron -- 2.7.3 Back-Propagation Network -- 2.7.4 Radial Basis Function Network -- 2.7.5 Generalized Regression Neural Networks -- 2.7.6 Summary -- 2.8 Unsupervised Learning Networks -- 2.8.1 Introduction -- 2.8.2 Kohonen Self-Organizing Feature Maps -- 2.8.3 Counter Propagation Network -- 2.8.4 Adaptive Resonance Theory Network -- 2.8.5 Summary -- 2.9 Special Networks -- 2.9.1 Introduction -- 2.9.2 Gaussian Machine -- 2.9.3 Cauchy Machine -- 2.9.4 Probabilistic Neural Network -- 2.9.5 Cascade Correlation Neural Network -- 2.9.6 Cognitive Network -- 2.9.7 Cellular Neural Network -- 2.9.8 Optical Neural Network -- 2.9.9 Summary -- 2.10 Working Principle of ANN -- 2.10.1 Introduction -- 2.10.2 Types of Activation Function -- 2.10.3 ANN Architecture -- 2.10.4 Learning Process -- 2.10.5 Feed-Forward Back Propagation -- 2.10.6 Strengths of ANN -- 2.10.7 Weaknesses of ANN -- 2.10.8 Working of the Network -- 2.10.9 Summary -- Bibliography -- 3: Fuzzy Logic -- 3.1 Introduction to Classical Sets and Fuzzy Sets -- 3.1.1 Classical Sets -- 3.1.2 Fuzzy Sets -- 3.1.3 Summary.…”
Full text (MFA users only)
Electronic eBook -
396
Practical Strategies in Geriatric Mental Health : Cases and Approaches.
Published 2019Full text (MFA users only)
Electronic eBook -
397
Data mining for the social sciences : an introduction
Published 2015Full text (MFA users only)
Electronic eBook -
398
Handbook for pandemic and mass-casualty planning and response
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
399
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook -
400
Machine learning for the web
Published 2016Table of Contents: “…Preface; Introduction to Practical Machine Learning Using Python; General machine-learning concepts; Machine-learning example; Installing and importing a module (library); Preparing, manipulating and visualizing data -- NumPy, pandas and matplotlib tutorials; Using NumPy; Arrays creation; Array manipulations; Array operations; Linear algebra operations; Statistics and mathematical functions; Understanding the pandas module; Exploring data; Manipulate data; Matplotlib tutorial; Scientific libraries used in the book; When to use machine learning; Summary; Unsupervised Machine Learning.…”
Full text (MFA users only)
Electronic eBook