Search Results - (((((((ant OR wyatt) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 56
- Data processing 54
- Mathematics 43
- Mathematical models 37
- artificial intelligence 30
- Machine learning 28
- Mathematical optimization 26
- Algorithms 25
- Data mining 24
- Technological innovations 22
- Artificial Intelligence 21
- algorithms 21
- Social aspects 19
- Computer networks 17
- History 15
- Information technology 15
- Computer science 14
- Big data 13
- Computer algorithms 13
- Python (Computer program language) 13
- Data Mining 12
- Digital techniques 12
- Image processing 12
- Research 12
- Statistical methods 12
- methods 12
- Design and construction 11
- Engineering 11
- Management 11
- Decision making 10
Search alternatives:
-
661
Contemporary Ring Theory 2011 : Proceedings of the Sixth China-japan-korea International Conference on Ring Theory.
Published 2012Table of Contents: “…Abelian rings and uniquely clean rings; References; WHEN DO THE DIRECT SUMS OF MODULES INHERIT CERTAIN PROPERTIES? …”
Full text (MFA users only)
Electronic eBook -
662
The Big Bang Theory and Philosophy : Rock, Paper, Scissors, Aristotle, Locke
Published 2012Table of Contents: “…; The Giant "Hedon" Collider; The Egoism Polarization; The Social Contract Instability; The Aristotelian Virtue Vortex; The Dennis Kim Conundrum; Part Three: "Perhaps You Mean A Different Thing Than I Do When You Say 'Science'"; Chapter 7: Getting Fundamental about Doing Physics in The Big Bang Theory; Studies in Sheldonology; A Unified Theory of Sheldon?…”
Full text (MFA users only)
Electronic eBook -
663
-
664
Regularization theory for ill-posed problems : selected topics
Published 2013Table of Contents: “…Numerical examples3 Multiparameter regularization; 3.1 When do we really need multiparameter regularization?…”
Full text (MFA users only)
Electronic eBook -
665
-
666
Analytics stories : using data to make good things happen
Published 2021Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
Full text (MFA users only)
Electronic eBook -
667
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
668
Vehicle Dynamics.
Published 2015Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
Full text (MFA users only)
Electronic eBook -
669
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
670
Handbook of convex optimization methods in imaging science
Published 2017Full text (MFA users only)
Electronic eBook -
671
Stochastic filtering with applications in finance
Published 2010Table of Contents: “…Economic convergence in a filtering framework. 3.3. Ex-ante equity risk premium. 3.4. Concluding remarks -- 4. …”
Full text (MFA users only)
Electronic eBook -
672
Essentials of Monte Carlo Simulation : Statistical Methods for Building Simulation Models.
Published 2012Full text (MFA users only)
Electronic eBook -
673
Data Analysis and Applications 1 : New and Classical Approaches.
Published 2019Table of Contents: “…Similarity to homogeneous distributional shapes1.3.11. Stability; 1.3.12. Further Aspects; 1.4. …”
Full text (MFA users only)
Electronic eBook -
674
Advanced mathematical & computational tools in metrology & testing VIII
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
675
The structure of amorphous materials using molecular dynamics
Published 2023Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
Full text (MFA users only)
Electronic eBook -
676
Language processing and grammars : the role of functionally oriented computational models
Published 2014Full text (MFA users only)
Electronic eBook -
677
The method of the generalised eikonal : new approaches in the Diffraction Theory.
Published 2015Full text (MFA users only)
Electronic eBook -
678
Statistical learning from a regression perspective
Published 2008Full text (MFA users only)
Electronic eBook -
679
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
Full text (MFA users only)
Electronic eBook -
680
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Full text (MFA users only)
Electronic eBook