Search Results - (((((((anti OR mantis) OR mantis) OR wanted) OR cantor) OR anne) OR wkant) OR wanting) algorithms.

  1. 181

    6G Wireless Communications and Mobile Networking.

    Published 2021
    Table of Contents: “…Terminal-positioning and Other Novel Applications -- MASSIVE MIMO ANTENNA FOR MOBILE COMMUNICATIONS -- Massive MIMO Antenna Array Design and Synthesis -- Massive MIMO Antenna Decoupling Technology -- Large-Scale Antenna Beamforming Technology -- Null-notch Beamforming Algorithm Based on LMS Criterion -- DESIGN OF FEED NETWORK AND RF FRONT-END -- Feeding Technology of Base Station Antenna -- Design of RF Front-End for Large-Scale Active Antenna -- ANTENNA SELECTION TECHNOLOGY -- Antenna Selection Criteria and Classification -- Optimal Antenna Selection Algorithm -- Incremental Antenna Selection Algorithm -- Decreasing Antenna Selection Algorithm -- MEASUREMENT TECHNOLOGY OF MASSIVE MIMO ANTENNA -- OTA Testing Requirements for Massive MIMO Antenna -- Near-Field and Far-Field Measurement -- Far-Field Test -- Near-Field Test: -- OTA Testing Process -- SUMMARY -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES.…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Database technology for life sciences and medicine

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  3. 183
  4. 184
  5. 185
  6. 186

    Practical data analysis by Cuesta, Hector

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009

    Published 2010
    Table of Contents: “…Shafie -- The investigation of input shaping with different polarities for anti-sway control of a gantry crane system / Mohd. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 188
  9. 189
  10. 190
  11. 191

    Machine Learning in Chemical Safety and Health : Fundamentals with Applications. by Wang, Qingsheng

    Published 2022
    Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Computational models of argument : Proceedings of COMMA 2012

    Published 2012
    Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 193

    Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization by Kim, Kwang-Yong, 1956-, Samad, Abdus, Benini, Ernesto

    Published 2019
    Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
    Full text (MFA users only)
    Electronic eBook
  14. 194

    The Dictionary of Critical Social Sciences. by Young, T. R.

    Published 2019
    Table of Contents: “…Cover -- Half Title -- Title -- Copyright -- Dedication -- Preface -- Authors' Note -- Acknowledgments -- A -- AARP -- Abduction -- Abolitionism -- Abortion -- Abuse, Child -- Abuse, Spousal -- Accenting the Sign -- Act -- Act, Philosophy of -- Acton, Lord (1834-1902) -- Actor -- Adolescence -- Adorno, Theodor (1903-1969) -- Adventist Religious Groups -- Advertising -- Aesthetics -- Aesthetics (Socialist) -- Affect -- Age -- Aged, Immiseration of -- Age Grades -- Agency, Human -- Agitation -- Agnosticism -- Agrarian Society -- Agriculture -- Agriculture, Hydraulic Societies -- Agrippa -- Ahistoricism -- Algorithm -- Alienation -- Alienation, Assumptions of -- Alienation, Psychological -- Allegory -- Analogy -- Analysis -- Anarchy -- Androcentricism -- Animal Functions -- Anomia -- Anomie -- Anthropocentrism -- Anthropology -- Anthropomorphism -- Anti-Foundationalism -- Anti-Semitism -- Apathy -- Apollonian -- Apology -- Apple, and Temptation to Knowledge -- Appropriation -- Appropriation, Mechanisms of -- Aquinas, Thomas, St. (1225-1274) -- Archaeology -- Archetype -- Aristocracy -- Aristotle (384-322 B.C.E.) -- Art -- Artificial Intelligence -- Artificial Stupidity -- Asceticism -- Ascribed Status -- Ashby's Law of Requisite Variety -- Assimilation -- Atheism -- Attitude -- Attractor -- Attractor, Strange -- Augustine, St. (354-430) -- Author -- Authoritarianism -- Authoritarian Personality -- Authority -- Automation -- Autonomy -- Away(s) -- Axiology -- Axiom -- B -- Back Stage -- Bacon, Francis (1561-1626) -- Bakunin, Mikhail (1814-1876) -- Balance of Payments -- Balance of Trade -- Banditry, Social -- Barbarism -- Barthes, Roland (1915-1980) -- Base -- Baseball -- Base Communities -- Bastard -- Baudrillard, Jean (1929- ) -- Beauvoir, Simone de (1908-1986) -- Behavior -- Behaviorism -- Behavior Modification -- Belief.…”
    Full text (MFA users only)
    Electronic eBook
  15. 195
  16. 196
  17. 197

    QoS in integrated 3G networks by Lloyd-Evans, Robert

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Deep learning with Python : a hands-on introduction by Ketkar, Nikhil

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Deep learning for dummies by Mueller, John, 1958-, Massaron, Luca

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  20. 200

    Robust and error-free geometric computing by Eberly, Dave

    Published 2020
    Full text (MFA users only)
    Electronic eBook