Search Results - (((((((anti OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 38
- Data processing 36
- Mathematics 28
- Mathematical models 27
- Machine learning 26
- Algorithms 23
- artificial intelligence 23
- Technological innovations 22
- algorithms 22
- Data mining 20
- Computer algorithms 17
- Computer networks 17
- Artificial Intelligence 15
- Diseases 14
- Research 14
- Social aspects 14
- methods 14
- Big data 13
- Information technology 13
- Management 13
- Development 12
- Mathematical optimization 12
- Data Mining 11
- History 11
- Application software 10
- Computer simulation 10
- Electronic data processing 10
- Neural networks (Computer science) 10
- Security measures 10
- Decision making 9
Search alternatives:
- wanti »
- mantis »
-
521
Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009
Published 2010Table of Contents: “…Shafie -- The investigation of input shaping with different polarities for anti-sway control of a gantry crane system / Mohd. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
522
Integration of swarm intelligence and artificial neural network
Published 2011Full text (MFA users only)
Electronic eBook -
523
Social-behavioral modeling for complex systems
Published 2019Full text (MFA users only)
Electronic eBook -
524
Big data and differential privacy : analysis strategies for railway track engineering
Published 2017Full text (MFA users only)
Electronic eBook -
525
Linear Models.
Published 2016Table of Contents: “…(Gauss-Markov Theorem) -- e Least-squares Theory When The Parameters are Random Variables -- 4 Consequences of Estimation -- a Unbiasedness -- b Variances -- c Estimating E(y)…”
Full text (MFA users only)
Electronic eBook -
526
Large Scale Network-Centric Distributed Systems
Published 2014Full text (MFA users only)
Electronic eBook -
527
Intelligent computational systems : a multi-disciplinary perspective
Published 2017Full text (MFA users only)
Electronic eBook -
528
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
529
Contemporary Ring Theory 2011 : Proceedings of the Sixth China-japan-korea International Conference on Ring Theory.
Published 2012Table of Contents: “…Abelian rings and uniquely clean rings; References; WHEN DO THE DIRECT SUMS OF MODULES INHERIT CERTAIN PROPERTIES? …”
Full text (MFA users only)
Electronic eBook -
530
The Big Bang Theory and Philosophy : Rock, Paper, Scissors, Aristotle, Locke
Published 2012Table of Contents: “…; The Giant "Hedon" Collider; The Egoism Polarization; The Social Contract Instability; The Aristotelian Virtue Vortex; The Dennis Kim Conundrum; Part Three: "Perhaps You Mean A Different Thing Than I Do When You Say 'Science'"; Chapter 7: Getting Fundamental about Doing Physics in The Big Bang Theory; Studies in Sheldonology; A Unified Theory of Sheldon?…”
Full text (MFA users only)
Electronic eBook -
531
-
532
Regularization theory for ill-posed problems : selected topics
Published 2013Table of Contents: “…Numerical examples3 Multiparameter regularization; 3.1 When do we really need multiparameter regularization?…”
Full text (MFA users only)
Electronic eBook -
533
Analytics stories : using data to make good things happen
Published 2021Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
Full text (MFA users only)
Electronic eBook -
534
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
535
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
536
Vehicle Dynamics.
Published 2015Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
Full text (MFA users only)
Electronic eBook -
537
Banking and finance issues in emerging markets.
Published 2018Full text (MFA users only)
Electronic eBook -
538
Symbolic computation and education
Published 2007Full text (MFA users only)
Electronic Conference Proceeding eBook -
539
Informatics for Health
Published 2017Table of Contents: “…Connected and Digital Health -- Design and Validation of a Platform to Evaluate mHealth Apps -- Reasoning and Data Representation in a Health and Lifestyle Support System -- Feasibility of Representing a Danish Microbiology Model Using FHIR -- Establishment of Requirements and Methodology for the Development and Implementation of GreyMatters, a Memory Clinic Information System -- Nurses' Perspectives on In-Home Monitoring of Elderlies's Motion Pattern -- Monitoring Activities Related to Medication Adherence in Ambient Assisted Living Environments -- Design, Implementation and Operation of a Reading Center Platform for Clinical Studies -- Web Validation Service for Ensuring Adherence to the DICOM Standard -- A Decision Support System for Cardiac Disease Diagnosis Based on Machine Learning Methods -- Severity Summarization and Just in Time Alert Computation in mHealth Monitoring -- Towards Safe and Efficient Child Primary Care -- Gaps in the Use of Unique Identifiers in Europe -- Why Are Children's Interests Invisible in European National E-Health Strategies? -- Shared Decision Making via Personal Health Record Technology for Routine Use of Diabetic Youth: A Study Protocol -- A Medication Reminder Mobile App: Does It Work for Different Age Ranges -- Internet of Things in Health Trends Through Bibliometrics and Text Mining -- Developing the Safety Case for MediPi: An Open-Source Platform for Self Management -- UK Health and Social Care Case Studies: Iterative Technology Development -- 2. …”
Full text (MFA users only)
Electronic eBook -
540
Software engineering for embedded systems : methods, practical techniques, and applications
Published 2013Table of Contents: “…-- Kinds of software reuse -- Implementing reuse by layers -- Going to the next level -- Introducing the component factory -- Factory hardware configuration -- Factory software configuration -- How the factory aids reusability -- RTOS agnosticism -- Arbitrary extensibility -- Conclusion -- References -- Example: latency vs. throughput in an eNodeB application -- Performance patterns and anti-patterns -- References -- The code optimization process -- Using the development tools -- Compiler optimization -- Basic compiler configuration -- Enabling optimizations -- Additional optimization configurations -- Using the profiler -- Background -- understanding the embedded architecture -- Resources -- Basic C optimization techniques -- Choosing the right data types -- Functions calling conventions -- Pointers and memory access -- Restrict and pointer aliasing -- Loops -- Additional tips and tricks -- General loop transformations -- Loop unrolling -- Multisampling -- Partial summation -- Software pipelining -- Example application of optimization techniques: cross-correlation -- Setup -- Original implementation -- Step 1: use intrinsics for fractional operations and specify loop counts -- Step 2: specify data alignment and modify for multisampling algorithm -- Step 3: assembly-language optimization -- Introduction -- Code size optimizations -- Compiler flags and flag mining -- Target ISA for size and performance tradeoffs -- Tuning the ABI for code size -- Caveat emptor: compiler optimization orthogonal to code size! …”
Full text (MFA users only)
Electronic eBook