Search Results - (((((((anti OR hands) OR wanting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Machine learning 40
- Artificial intelligence 36
- Mathematical models 31
- Mathematics 24
- artificial intelligence 21
- Algorithms 20
- Data mining 20
- Python (Computer program language) 18
- algorithms 17
- Technological innovations 16
- methods 16
- Computer networks 15
- Development 14
- Application software 13
- Artificial Intelligence 13
- Computer algorithms 13
- Digital techniques 13
- Management 13
- Signal processing 13
- Diseases 12
- Neural networks (Computer science) 12
- Big data 11
- Security measures 11
- Social aspects 11
- Computer security 10
- Information technology 10
- Machine Learning 10
- Computer science 9
- Data Mining 9
Search alternatives:
- wanting »
- markant »
-
341
Handbook of biometrics for forensic science
Published 2017Table of Contents: “…3.5.2 Application Using Fingermarks3.5.2.1 Forensic Intelligence; 3.5.2.2 Forensic Investigation; 3.5.2.3 Forensic Evaluation; 3.5.3 Current Challenges; 3.5.3.1 Automation and Transparency; 3.5.3.2 Scalability and Interoperability; 3.5.3.3 Forensic Fingermark Processes; 3.6 Conclusion; References; 4 Challenges for Fingerprint Recognition-Spoofing, Skin Diseases, and Environmental Effects; Abstract; 4.1 Spoofing and Anti-spoofing; 4.1.1 Perspiration; 4.1.2 Spectroscopic Characteristics; 4.1.3 Ultrasonic Technology; 4.1.4 Physical Characteristics: Temperature.…”
Full text (MFA users only)
Electronic eBook -
342
Systemic Risk from Global Financial Derivatives.
Published 2012Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
Full text (MFA users only)
Electronic eBook -
343
Uveitis : a practical guide to the diagnosis and treatment of intraocular unflammation
Published 2017Table of Contents: “…IndicationsLaser Therapy; Surgery; Steroids; Anti-VEGF Agents; Prognosis; Prevention; Conclusion; References; 11 Rubella; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 12 Syphilis; Introduction/Clinical Features; Epidemiology; Diagnostic Evaluation; Treatment and Monitoring; Prognosis; References; 13 Ocular Toxocariasis; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 14 Ocular Toxoplasmosis; Introduction; Etiology; Epidemiology; Clinical Presentation.…”
Full text (MFA users only)
Electronic eBook -
344
Numerical Methods for Eigenvalue Problems.
Published 2012Full text (MFA users only)
Electronic eBook -
345
Peripheral ulcerative keratitis : a comprehensive guide
Published 2017Full text (MFA users only)
Electronic eBook -
346
Advanced wireless networks : technology and business models
Published 2016Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
Full text (MFA users only)
Electronic eBook -
347
CompTIA security+ deluxe study guide : exam SY0-301
Published 2011Full text (MFA users only)
Electronic eBook -
348
Oxford Handbook of Respiratory Nursing
Published 2009Table of Contents: “…Symptoms of upper respiratory tract diseaseNon-specific and extra-pulmonary symptoms; Breathlessness 1; Breathlessness 2; Cough; Sputum; Haemoptysis; Chest pain; Respiratory examination; General inspection; Examination of the hands and limbs; Examination of the head and neck; Palpation; Percussion; Auscultation; Abnormal breath sounds; Completing the respiratory assessment; 5 Respiratory investigations; Introduction; Peak expiratory flow rate (PEFR); Performing the PEFR test; Spirometry; Vital capacity; Interpretation of results; Combined obstruction and restriction; Flow volume graphs.…”
Full text (MFA users only)
Electronic eBook -
349
-
350
Securing SQL server : protecting Your database from attackers
Published 2015Table of Contents: “…Chapter 3 -- Key ManagementInformation in this chapter; Service master key; Database master key; Encryption password management; Enterprise key management; High availability and disaster recovery for key management; Conclusions; Chapter 4 -- Database Encryption; Information in this chapter:; Database encryption; Hashing versus Encryption; Triple DES; RC Algorithms; Advanced Encryption Standard; Hashing; SHA2 and SQL Server; Encrypting Objects; Encrypting data within tables; Encrypting within Microsoft SQL Server; Encrypting Within the Application Tier.…”
Full text (MFA users only)
Electronic eBook -
351
Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture
Published 2019Table of Contents: “…Competition regulation, anti-competitive practices and dominant positions 144 13.2.5. …”
Full text (MFA users only)
Electronic eBook -
352
Circuit analysis
Published 2011Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
353
Reconfigurable computing : the theory and practice of FPGA-based computation
Published 2008Full text (MFA users only)
Electronic eBook -
354
Wireless sensor systems for extreme environments : space, underwater, underground and industrial
Published 2017Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
Full text (MFA users only)
Electronic eBook -
355
Selected papers from the 12th international symposium on electromagnetic fields in electrical engineering 2005, Volume 25, Issue 3.
Published 2006Table of Contents: “…Absorbing boundary conditions for compact modeling of on-chip passive structuresWide frequency band analysis of an antenna by finite elements; Application of Spice simulator in the evaluation of crosstalk computational models; Rigorous ADI-FDTD analysis of left-handed metamaterials in optimally-designed EMC applications; Comparison of numerical and measurement methods of SAR of ellipsoidal phantoms with muscle tissue electrical parameters; Numerical modeling of 3D intelligent comb drive accelerometer structure.…”
Full text (MFA users only)
Electronic eBook -
356
Rediscovering mathematics : you do the math
Published 2011Full text (MFA users only)
Electronic eBook -
357
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
358
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook -
359
Multi-processor system-on-chip. 1, Architectures
Published 2021Table of Contents: “…Matrix multiplication algorithm on the Plural architecture…”
Full text (MFA users only)
Electronic eBook -
360
Indoor Geolocation Science and Technology : At the Emergence of Smart World and IoT.
Published 2019Full text (MFA users only)
Electronic eBook