Search Results - (((((((anti OR want) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

Search alternatives:

  1. 161
  2. 162

    Urodynamics : a quick pocket guide by Vignoli, Giancarlo

    Published 2016
    Table of Contents: “…The framework of basic science -- Key symptoms analysis and diagnostic algorithms -- Physical examination and laboratory evaluation -- Urodynamic testing: when and which -- Voiding diary and Pad testing -- Non-invasive urodynamics -- Conventional urodynamics-conventional urodynamics in pediatric age -- Electromyogtrahy -- Urethral profilometry -- Videourodynamics -- Ambulatory urodynamics -- Urodynamics of upper urinary tract.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Mount Sinai expert guides. Hepatology

    Published 2014
    Table of Contents: “…Cover; Title page; Copyright page; Contents; List of Contributors; Series Foreword; Preface; Abbreviation List; About the Companion Website; PART 1: Hepatology; CHAPTER 1: Approach to the Patient with Abnormal Liver Tests; Section 1: Background; Definition of disease; Disease classification; Etiology; Pathology/pathogenesis; Section 2: Prevention; Section 3: Diagnosis; Typical presentation; Clinical diagnosis; Laboratory diagnosis; Diagnostic algorithm; Potential pitfalls/common errors made regarding diagnosis of disease; Section 4: Treatment; When to hospitalize…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Building Machine Learning Systems with Python. by Richert, Willi

    Published 2013
    Table of Contents: “…Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Python Machine Learning; Machine learning and Python -- the dream team; What the book will teach you (and what it will not); What to do when you are stuck; Getting started; Introduction to NumPy, SciPy, and Matplotlib; Installing Python; Chewing data efficiently with NumPy and intelligently with SciPy; Learning NumPy; Indexing; Handling non-existing values; Comparing runtime behaviors; Learning SciPy; Our first (tiny) machine learning application.…”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Applied modelling, numerical simulation, computation and optimization. by De Souza Neto, Eduardo

    Published 2017
    Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Firewall design and analysis by Liu, Alex X.

    Published 2011
    Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Digital holography by Picart, Pascal

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data by Golubyatnikov, V. P. (Vladimir P.)

    Published 2000
    Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
    Full text (MFA users only)
    Electronic eBook
  13. 173

    Advances in nonlinear waves and symbolic computation by Yan, Zhenya

    Published 2009
    Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Energy Psychology : Explorations at the Interface of Energy, Cognition, Behavior, and Health. by Gallo, Fred P.

    Published 2004
    Table of Contents: “…Manual Muscle Testing and KinesiologyApplied Kinesiology Offshoots; Empirical Research on Manual Muscle Testing; Muscle Testing Proficiency; Integrity and Muscle Testing; Therapy and Diagnosis; Self-Testing; Therapeutic Algorithms vs. Causal Diagnostics; Energy Psychology and Manual Muscle Testing; Abuses of Manual Muscle Testing and Algorithms; Manual Muscle Testing and Intuition; Unwarranted Uses; When We're Stumped; Systemic Manual Muscle Testing.…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Fast sequential Monte Carlo methods for counting and optimization by Rubinstein, Reuven Y.

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Applications of digital signal processing to audio and acoustics

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Prognostics and Health Management of Engineering Systems : an Introduction. by Kim, Nam-Ho

    Published 2016
    Table of Contents: “…2.2.2 When a Degradation Model Is Available (Physics-Based Approaches)2.2.2.1 Problem Definition; 2.2.2.2 Parameter Estimation and Degradation Prediction; 2.2.2.3 Effect of Noise in Data; 2.2.3 When a Degradation Model Is NOT Available (Data-Driven Approaches); 2.2.3.1 Function Evaluation; 2.2.3.2 Overfitting; 2.2.3.3 Prognosis with More Training Data; 2.3 RUL Prediction; 2.3.1 RUL; 2.3.2 Prognostics Metrics; 2.3.2.1 Prognostic Horizon (PH); 2.3.2.2 varvec{ alpha { -- } lambda} Accuracy; 2.3.2.3 (Cumulative) Relative Accuracy (RA, CRA); 2.3.2.4 Convergence; 2.3.2.5 Results with MATLAB Code.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Twitter and tear gas : the power and fragility of networked protest by Tufekci, Zeynep

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Multi-agent machine learning : a reinforcement approach

    Published 2014
    Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
    Full text (MFA users only)
    Electronic eBook