Search Results - (((((((kant OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 40
- Machine learning 35
- Mathematics 28
- Mathematical models 25
- artificial intelligence 25
- Data mining 24
- Algorithms 23
- algorithms 22
- Technological innovations 19
- Computer networks 18
- Artificial Intelligence 17
- Computer algorithms 17
- methods 17
- Application software 16
- Development 16
- Python (Computer program language) 15
- Social aspects 15
- Big data 14
- Data Mining 14
- Information technology 13
- Management 13
- Mathematical optimization 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- History 10
- Computer science 9
- Computer simulation 9
- Diseases 9
Search alternatives:
- kant »
- mantis »
- share »
-
341
Digital information ecosystems : smart press
Published 2019Table of Contents: “…Pressure from advertisers and readers; 4.2.1. When advertisers apply the pressure; 4.2.2. When readers put pressure on advertising…”
Full text (MFA users only)
Electronic eBook -
342
Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...
Published 2011Table of Contents: “…Chapter 2: Innovation Engineering ManagementConstruction and Expression of Database for Computer-Aided Welding Fixture Design (CAWFD) Systems; Study on Self-Evolutionary Game in Co-Operative Knowledge Sharing Manufacturing Network; A Case Library Creating Method Based on Risk Control of Tunnel Engineering; An Electronic Components Screening Quality Control Method; Fuzzy PID Temperature Control in Manufacturing Engineering; Research on Management Information System of the Logistics Supply Chain of Liaoning Agricultural and Mechanical Products…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
343
Mechanical, Electronic and Information Technology Engineering
Published 2015Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
344
How to measure anything in cybersecurity risk
Published 2016Table of Contents: “…; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?…”
Full text (MFA users only)
Electronic eBook -
345
Towards 5G : Applications, Requirements and Candidate Technologies.
Published 2016Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
Full text (MFA users only)
Electronic eBook -
346
Statistical analysis techniques in particle physics : fits, density estimation and supervised learning
Published 2013Full text (MFA users only)
Electronic eBook -
347
Compressed sensing : theory and applications
Published 2012Full text (MFA users only)
Electronic eBook -
348
-
349
Global optimization methods in geophysical inversion
Published 2013Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
Full text (MFA users only)
Electronic eBook -
350
Limits, Limits Everywhere : the Tools of Mathematical Analysis
Published 2012Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
Full text (MFA users only)
Electronic eBook -
351
Legitimate applications of peer to peer networks
Published 2004Table of Contents: “…-- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.…”
Full text (MFA users only)
Electronic eBook -
352
Multiple Sclerosis : Clinician's Guide to Diagnosis and Treatment.
Published 2013Table of Contents: “…Long-Term Disease-Modifying Therapies; Issues with Long-Term Immune-Modulating Therapies; Choosing a Disease-Modifying Therapy; Ensuring Treatment Adherence and Compliance; When Do I Initiate Treatment With Disease-Modifying Therapies?…”
Full text (MFA users only)
Electronic eBook -
353
Robust statistics : theory and methods (with R)
Published 2018Full text (MFA users only)
Electronic eBook -
354
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
355
A Statistical approach to genetic epidemiology : concepts and applications, with an e-Learning Platform.
Published 2012Table of Contents: “…; 4.3 HOW SHOULD GENOTYPING ERRORS BE CHECKED IN POPULATION-BASED STUDIES USING THE HARDY-WEINBERG EQUILIBRIUM?; Algorithm 4.1.; Algorithm 4.2.; Algorithm 4.3.; 4.4 HOW CAN GENOTYPING ERRORS BE DETECTED IN HIGH-THROUGHPUT GENOTYPING STUDIES?…”
Full text (MFA users only)
Electronic eBook -
356
Drones and other unmanned weapons systems under international law
Published 2018Full text (MFA users only)
Electronic eBook -
357
The Maudsley Prescribing Guidelines in Psychiatry
Published 2012Full text (MFA users only)
Electronic eBook -
358
-
359
Applied mechanics and industrial technologies : selected, peer reviewed papers from the 2012 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2012),...
Published 2013Table of Contents: “…An Assessment of Wet Compression Process in Gas Turbine Systems with an Analytical ModelingAssessment of Hole Quality and Thrust Force when Drilling CFRP/Al Stack Using Carbide Tools; Multi-Objective Optimization of Filament Wound Composite Pressure Vessels Based on Weight and Matrix Cracking/ Burst Pressure Using Imperialist Competitive Algorithm; In Situ Laser Build-Up Welding of Shipboard Crankshafts; Stress and Deformation Analysis for Caster Segment Based on ANSYS; Instable Crack Propagation Analysis with PDS-FEM; Reducing the Manufacturing Cost by Using Combination Die.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
360
Hierarchical Protection for Smart Grids.
Published 2018Table of Contents: “…2.3.4 Adaptive Overload Identification Method Based on the Complex Phasor Plane2.3.5 Novel Fault Phase Selection Scheme Utilizing Fault Phase Selection Factors; 2.4 Summary; References; Chapter 3 Local Area Protection for Renewable Energy; 3.1 Introduction; 3.2 Fault Transient Characteristics of Renewable Energy Sources; 3.2.1 Mathematical Model and LVRT Characteristics of the DFIG; 3.2.2 DFIG Fault Transient Characteristics When Crowbar Protection Is Not Put into Operation; 3.2.3 DFIG Fault Transient Characteristics When Crowbar Protection Is Put into Operation.…”
Full text (MFA users only)
Electronic eBook