Search Results - (((((((anti OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 521

    Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009

    Published 2010
    Table of Contents: “…Shafie -- The investigation of input shaping with different polarities for anti-sway control of a gantry crane system / Mohd. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 522

    Integration of swarm intelligence and artificial neural network

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  3. 523

    Social-behavioral modeling for complex systems

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  4. 524
  5. 525

    Linear Models. by Searle, Shayle R.

    Published 2016
    Table of Contents: “…(Gauss-Markov Theorem) -- e Least-squares Theory When The Parameters are Random Variables -- 4 Consequences of Estimation -- a Unbiasedness -- b Variances -- c Estimating E(y)…”
    Full text (MFA users only)
    Electronic eBook
  6. 526

    Large Scale Network-Centric Distributed Systems

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  7. 527

    Intelligent computational systems : a multi-disciplinary perspective

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  8. 528

    Machine Learning in Chemical Safety and Health : Fundamentals with Applications. by Wang, Qingsheng

    Published 2022
    Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
    Full text (MFA users only)
    Electronic eBook
  9. 529

    Contemporary Ring Theory 2011 : Proceedings of the Sixth China-japan-korea International Conference on Ring Theory. by Kim, Jin Yong

    Published 2012
    Table of Contents: “…Abelian rings and uniquely clean rings; References; WHEN DO THE DIRECT SUMS OF MODULES INHERIT CERTAIN PROPERTIES? …”
    Full text (MFA users only)
    Electronic eBook
  10. 530

    The Big Bang Theory and Philosophy : Rock, Paper, Scissors, Aristotle, Locke

    Published 2012
    Table of Contents: “…; The Giant "Hedon" Collider; The Egoism Polarization; The Social Contract Instability; The Aristotelian Virtue Vortex; The Dennis Kim Conundrum; Part Three: "Perhaps You Mean A Different Thing Than I Do When You Say 'Science'"; Chapter 7: Getting Fundamental about Doing Physics in The Big Bang Theory; Studies in Sheldonology; A Unified Theory of Sheldon?…”
    Full text (MFA users only)
    Electronic eBook
  11. 531

    Mechanical Instability. by Krysinski, Tomasz

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  12. 532

    Regularization theory for ill-posed problems : selected topics by Lu, Shuai, Pereverzev, Sergei V.

    Published 2013
    Table of Contents: “…Numerical examples3 Multiparameter regularization; 3.1 When do we really need multiparameter regularization?…”
    Full text (MFA users only)
    Electronic eBook
  13. 533

    Analytics stories : using data to make good things happen by Winston, Wayne L.

    Published 2021
    Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
    Full text (MFA users only)
    Electronic eBook
  14. 534

    Computational models of argument : Proceedings of COMMA 2012

    Published 2012
    Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 535

    A Hands-On Guide to Designing Embedded Systems. by Taylor, Adam

    Published 2021
    Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
    Full text (MFA users only)
    Electronic eBook
  16. 536

    Vehicle Dynamics. by Meywerk, Martin

    Published 2015
    Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
    Full text (MFA users only)
    Electronic eBook
  17. 537

    Banking and finance issues in emerging markets.

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  18. 538

    Symbolic computation and education

    Published 2007
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 539

    Informatics for Health by Randell, R.

    Published 2017
    Table of Contents: “…Connected and Digital Health -- Design and Validation of a Platform to Evaluate mHealth Apps -- Reasoning and Data Representation in a Health and Lifestyle Support System -- Feasibility of Representing a Danish Microbiology Model Using FHIR -- Establishment of Requirements and Methodology for the Development and Implementation of GreyMatters, a Memory Clinic Information System -- Nurses' Perspectives on In-Home Monitoring of Elderlies's Motion Pattern -- Monitoring Activities Related to Medication Adherence in Ambient Assisted Living Environments -- Design, Implementation and Operation of a Reading Center Platform for Clinical Studies -- Web Validation Service for Ensuring Adherence to the DICOM Standard -- A Decision Support System for Cardiac Disease Diagnosis Based on Machine Learning Methods -- Severity Summarization and Just in Time Alert Computation in mHealth Monitoring -- Towards Safe and Efficient Child Primary Care -- Gaps in the Use of Unique Identifiers in Europe -- Why Are Children's Interests Invisible in European National E-Health Strategies? -- Shared Decision Making via Personal Health Record Technology for Routine Use of Diabetic Youth: A Study Protocol -- A Medication Reminder Mobile App: Does It Work for Different Age Ranges -- Internet of Things in Health Trends Through Bibliometrics and Text Mining -- Developing the Safety Case for MediPi: An Open-Source Platform for Self Management -- UK Health and Social Care Case Studies: Iterative Technology Development -- 2. …”
    Full text (MFA users only)
    Electronic eBook
  20. 540

    Software engineering for embedded systems : methods, practical techniques, and applications

    Published 2013
    Table of Contents: “…-- Kinds of software reuse -- Implementing reuse by layers -- Going to the next level -- Introducing the component factory -- Factory hardware configuration -- Factory software configuration -- How the factory aids reusability -- RTOS agnosticism -- Arbitrary extensibility -- Conclusion -- References -- Example: latency vs. throughput in an eNodeB application -- Performance patterns and anti-patterns -- References -- The code optimization process -- Using the development tools -- Compiler optimization -- Basic compiler configuration -- Enabling optimizations -- Additional optimization configurations -- Using the profiler -- Background -- understanding the embedded architecture -- Resources -- Basic C optimization techniques -- Choosing the right data types -- Functions calling conventions -- Pointers and memory access -- Restrict and pointer aliasing -- Loops -- Additional tips and tricks -- General loop transformations -- Loop unrolling -- Multisampling -- Partial summation -- Software pipelining -- Example application of optimization techniques: cross-correlation -- Setup -- Original implementation -- Step 1: use intrinsics for fractional operations and specify loop counts -- Step 2: specify data alignment and modify for multisampling algorithm -- Step 3: assembly-language optimization -- Introduction -- Code size optimizations -- Compiler flags and flag mining -- Target ISA for size and performance tradeoffs -- Tuning the ABI for code size -- Caveat emptor: compiler optimization orthogonal to code size! …”
    Full text (MFA users only)
    Electronic eBook