Search Results - (((((((kant OR wante) OR santis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 43
- Artificial intelligence 40
- Machine learning 35
- Mathematics 28
- Mathematical models 25
- artificial intelligence 25
- Data mining 24
- Algorithms 23
- algorithms 22
- Technological innovations 19
- Computer networks 18
- Artificial Intelligence 17
- Computer algorithms 17
- methods 17
- Application software 16
- Development 16
- Python (Computer program language) 15
- Social aspects 15
- Big data 14
- Data Mining 14
- Information technology 13
- Management 13
- Mathematical optimization 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- History 10
- Computer science 9
- Computer simulation 9
- Diseases 9
Search alternatives:
-
221
The attacker's advantage : turning uncertainty into breakthrough opportunities
Published 2015Full text (MFA users only)
Electronic eBook -
222
Data mining techniques : for marketing, sales, and customer relationship management
Published 2011Table of Contents: “…-- Data mining applications in marketing and customer relationship management -- The data mining process -- Statistics 101: What you should know about data -- Descriptions and prediction: profiling and predictive modeling -- Data mining using classic statistical techniques -- Decision trees -- Artificail neural networks -- Nearest neighbor approaches: Memory-based reasoning and collaborative filtering -- Knowing when to worry: Using survival analysis to understand customers -- Genetic algorithms and swarm intelligence -- Tell me something new: Pattern discovery and data mining -- Finding islands of similarity: Automatic cluster detection -- Alternative approaches to cluster detection -- Market basket analysis and association rules -- Link analysis -- Data warehousing, OLAP, analytic sandboxes, and data mining -- Building customer signatures -- Derived variables: Making the data mean more -- Too much of a good thing? …”
Full text (MFA users only)
Electronic eBook -
223
Cognitive Electronic Warfare : An Artificial Intelligence Approach.
Published 2021Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
Full text (MFA users only)
Electronic eBook -
224
Pulmonary arterial hypertension : diagnosis and evidence-based treatment
Published 2008Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
Full text (MFA users only)
Electronic eBook -
225
Figuring it out : entertaining encounters with everyday math
Published 2010Table of Contents: “…. -- The dinner table algorithm -- Cutting the Christmas cake -- Oranges and computers -- When two and two don't make four -- Getting more intelligent every day -- The other lane always goes faster -- Shoelaces and neckties -- Number puzzles -- Tossing a coin -- The switch -- Eubulides, the heap and the Euro -- The Earth is Round. -- How GPS works -- Gear wheels -- February 29 -- The Nonius scale -- Pedro Nunes' map -- Lighthouse geometry -- Asteroids and least squares -- The useful man and the genius -- Secret Affairs. -- Alice and Bob -- Inviolate cybersecrets -- Quantum cryptography -- The FBI wavelet -- The enigma machine -- Art and Geometry. -- The Vitruvian man -- The golden number -- The geometry of A4 paper sizes -- The strange worlds of Escher -- Escher and the Möbius strip -- Picasso, Einstein and the fourth dimension -- Pollock's fractals -- Voronoi diagrams -- The Platonic solids -- Pythagorean mosquitoes -- The most beautiful of all -- Mathematical Objects. -- The power of math -- Doubts in the realm of certainty -- When chance enhances reliability -- The difficulty of chance -- Conjectures and proofs -- Mr. …”
Full text (MFA users only)
Electronic eBook -
226
Code : Collaborative Ownership and the Digital Economy.
Full text (MFA users only)
Electronic eBook -
227
A Case for the Existence of God.
Published 2008Table of Contents: “…A CASE FOR THE EXISTENCE OF GOD; ABRIDGED CONTENTS; CONTENTS; FOREWORD; PREFACE; ACKNOWLEDGMENTS; Chapter 01: INTRODUCTION; Chapter 02: THE QUESTION OF GOD'S EXISTENCE; Chapter 03: MANY GENERATIONS OF PHILOSOPHERS HAVE MADE THE MISTAKE OF ASSUMING HUME AND KANT'S OBJECTIONS DISPOSED OF THE COSMOLOGICAL ARGUMENT; Chapter 04: A UNIVERSE WITH AN INFINITE PAST WOULD STILL REQUIRE A NECESSARY BEING TO SUSTAIN ITS EXISTENCE; Chapter 05: BECAUSE THE UNIVERSE (OR MULTIVERSE) HAD A BEGINNING, IT IS CONTINGENT AND HAS A CAUSE FOR ITS COMING INTO EXISTENCE.…”
Full text (MFA users only)
Electronic eBook -
228
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Full text (MFA users only)
Electronic eBook -
229
Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...
Published 2013Full text (MFA users only)
Electronic Conference Proceeding eBook -
230
Mechanisms and games for dynamic spectrum allocation
Published 2013Table of Contents: “…7.3.10 Other equilibrium concepts -- 7.4 Learning equilibria -- 7.4.1 Learning Nash equilibria -- 7.4.2 Learning epsilon-equilibrium -- 7.4.3 Learning coarse correlated equilibrium -- 7.4.4 Learning satisfaction equilibrium -- 7.4.5 Discussion -- 7.5 Conclusion -- References -- II Cognitive radio and sharing of unlicensed spectrum -- 8 Cooperation in cognitiveradio networks: from accessto monitoring -- 8.1 Introduction -- 8.1.1 Cooperation in cognitive radio: mutual benefits and costs -- 8.2 An overview of coalitional game theory -- 8.3 Cooperative spectrum exploration and exploitation -- 8.3.1 Motivation -- 8.3.2 Basic problem -- 8.3.3 Joint sensing and access as a cooperative game -- 8.3.4 Coalition formation algorithm for joint sensing and access -- 8.3.5 Numerical results -- 8.4 Cooperative primary user activity monitoring -- 8.4.1 Motivation -- 8.4.2 Primary user activity monitoring: basic model -- 8.4.3 Cooperative primary user monitoring -- 8.4.4 Numerical results -- 8.5 Summary -- Acknowledgements -- Copyright notice -- References -- 9 Cooperative cognitive radios with diffusion networks -- 9.1 Introduction -- 9.2 Preliminaries -- 9.2.1 Basic tools in convex and matrix analysis -- 9.2.2 Graphs -- 9.3 Distributed spectrum sensing -- 9.4 Iterative consensus-based approaches -- 9.4.1 Average consensus algorithms -- 9.4.2 Acceleration techniques for iterative consensus algorithms -- 9.4.3 Empirical evaluation -- 9.5 Consensus techniques based on CoMAC -- 9.6 Adaptive distributed spectrum sensing based on adaptive subgradient techniques -- 9.6.1 Distributed detection with adaptive filters -- 9.6.2 Set-theoretic adaptive filters for distributed detection -- 9.6.3 Empirical evaluation -- 9.7 Channel probing -- 9.7.1 Introduction -- 9.7.2 Admissibility problem -- 9.7.3 Power and admission control algorithms.…”
Full text (MFA users only)
Electronic eBook -
231
Handbook of power systems. II
Published 2010Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
Full text (MFA users only)
Electronic eBook -
232
Parallel computing : technology trends
Published 2020Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
233
New autonomous systems
Published 2016Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
Full text (MFA users only)
Electronic eBook -
234
All Source Positioning, Navigation and Timing
Published 2020Full text (MFA users only)
Electronic eBook -
235
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
236
There's Something about Gödel : The Complete Guide to the Incompleteness Theorem.
Published 2009Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
Full text (MFA users only)
eBook -
237
Randomness through computation : some answers, more questions
Published 2011Full text (MFA users only)
Electronic eBook -
238
The Rise of Technosocialism : How Inequality, AI and Climate Will Usher in a New World.
Published 2021Full text (MFA users only)
Electronic eBook -
239
R High Performance Programming.
Published 2015Table of Contents: “…Data parallelism versus task parallelismImplementing data parallel algorithms; Implementing task parallel algorithms; Running the same task on workers in a cluster; Running different tasks on workers in a cluster; Executing tasks in parallel on a cluster of computers; Shared memory versus distributed memory parallelism; Optimizing parallel performance; Summary; Chapter 9: Offloading Data Processing to Database Systems; Extracting data into R versus processing data in a database; Preprocessing data in a relational database using SQL; Converting R expressions into SQL; Using dplyr…”
Full text (MFA users only)
Electronic eBook -
240