Search Results - (((((((kant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 40
- Artificial intelligence 37
- Mathematics 35
- Mathematical models 31
- Machine learning 26
- Algorithms 22
- artificial intelligence 22
- algorithms 19
- Social aspects 18
- Technological innovations 17
- Mathematical optimization 16
- Artificial Intelligence 15
- Computer networks 15
- Data mining 15
- History 14
- Computer algorithms 13
- Research 12
- Statistical methods 12
- methods 12
- Digital techniques 11
- Image processing 11
- Python (Computer program language) 11
- Development 10
- Engineering 10
- Neural networks (Computer science) 10
- Philosophy 10
- Application software 9
- Automation 9
- Diseases 9
- Information technology 9
Search alternatives:
- kant »
- wanti »
- mantis »
-
321
Wireless sensor systems for extreme environments : space, underwater, underground and industrial
Published 2017Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
Full text (MFA users only)
Electronic eBook -
322
Robotics : science and systems IV
Published 2009Table of Contents: “…Preface; Organizing Committee; Program Committee; Sponsors; Multi-Sensor Lane Finding in Urban Road Networks; Laser and Vision Based Outdoor Object Mapping; Fast Probabilistic Labeling of City Maps; Clustering Sensor Data for Terrain Identification using a Windowless Algorithm; Distributed Localization of Modular Robot Ensembles; Controlling Shapes of Ensembles of Robots of Finite Size with Nonholonomic Constraints; Stochastic Recruitment; Prior Data and Kernel Conditional Random Fields for Obstacle Detection; SARSOP…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
323
Design studies and intelligence engineering
Published 2022Table of Contents: “…Intro -- Title Page -- Preface -- Contents -- PSIC3839: Predicting the Overall Emotion and Depth of Entire Songs -- Research on Noise Control of Product Symbol Communication Channel-Take a Small Rice Mill for Example -- Towards Better Data Pre-Processing for Building Recipe Recommendation Systems from Industrial Fabric Dyeing Manufacturing Records: Categorization of Coloration Properties for a Dye Combination on Different Fabrics -- A Multi-Robot Planning Algorithm with Quad Tree Map Division for Obstacles of Irregular Shape…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
324
Biomedical image understanding : methods and applications
Published 2014Table of Contents: “…Venkatesh -- Benchmarking lymph node metastasis classification for gastric cancer staging / Su Zhang, Chao Li, Shuheng Zhang, Lifang Pang and Huan Zhang -- The use of knowledge in biomedical image analysis / Florence Cloppet -- Active shape model for contour detection of anatomical structure / Huiqi Li and Qing Nie.…”
Full text (MFA users only)
Electronic eBook -
325
How to measure anything in cybersecurity risk
Published 2016Table of Contents: “…; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?…”
Full text (MFA users only)
Electronic eBook -
326
Materials science and processing, environmental engineering and information technologies : selected, peer reviewed papers from the 2014 International Conference on Application of M...
Published 2014Table of Contents: “…Materials Science and Processing, Environmental Engineering and Information Technologies; Preface and Organizing Committee; Table of Contents; Chapter 1: Materials for Mechanical Engineering and Technologies of Materials Processing; Wear Behaviors of PCBN Tools in Interrupted Turning Hardened Steel with Tool's Chamfer Angle and Edge Preparation Considered; Sintering of Frustum Shaped Polycrystalline Diamond Compact at Non-Hydrostatic Pressure; Experimental Research on Fabrication Process of Metal Powder for SLS; Hot Sizing Experiment Study of TC4 Titanium Alloy Bending Plate…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
327
Advanced Research in Materials and Engineering Applications
Published 2015Full text (MFA users only)
Electronic eBook -
328
Statistical analysis techniques in particle physics : fits, density estimation and supervised learning
Published 2013Full text (MFA users only)
Electronic eBook -
329
Limits, Limits Everywhere : the Tools of Mathematical Analysis
Published 2012Table of Contents: “…Continued Fractions; 9.1 Euclid's Algorithm; 9.2 Rational and Irrational Numbers as Continued Fractions; 10. …”
Full text (MFA users only)
Electronic eBook -
330
Multiple Sclerosis : Clinician's Guide to Diagnosis and Treatment.
Published 2013Table of Contents: “…Long-Term Disease-Modifying Therapies; Issues with Long-Term Immune-Modulating Therapies; Choosing a Disease-Modifying Therapy; Ensuring Treatment Adherence and Compliance; When Do I Initiate Treatment With Disease-Modifying Therapies?…”
Full text (MFA users only)
Electronic eBook -
331
Robust statistics : theory and methods (with R)
Published 2018Full text (MFA users only)
Electronic eBook -
332
Microbiological sensors for the drinking water industry
Published 2018Full text (MFA users only)
Electronic eBook -
333
Decision Intelligence for Dummies
Published 2022Table of Contents: “…Any road will take you there -- The great rethink when it comes to making decisions at scale -- Applying the Upside-Down V: The Path to the Output and Back Again -- Evaluating Your Inverted V Revelations -- Having Your Inverted V Lightbulb Moment -- Recognizing Why Things Go Wrong -- Aiming for too broad an outcome -- Mimicking data outcomes -- Failing to consider other decision sciences -- Mistaking gut instincts for decision science -- Failing to change the culture -- Part 2 Reaching the Best Possible Decision -- Chapter 5 Shaping a Decision into a Query -- Defining Smart versus Intelligent -- Discovering That Business Intelligence Is Not Decision Intelligence -- Discovering the Value of Context and Nuance -- Defining the Action You Seek -- Setting Up the Decision -- Chapter 6 Mapping a Path Forward -- Putting Data Last -- Recognizing when you can (and should) skip the data entirely -- Leaning on CRISP-DM -- Using the result you seek to identify the data you need -- Digital decisioning and decision intelligence -- Don't store all your data - know when to throw it out -- Adding More Humans to the Equation -- The shift in thinking at the business line level -- How decision intelligence puts executives and ordinary humans back in charge -- Limiting Actions to What Your Company Will Actually Do -- Looking at budgets versus the company will -- Setting company culture against company resources -- Using long-term decisioning to craft short-term returns -- Chapter 7 Your DI Toolbox -- Decision Intelligence Is a Rethink, Not a Data Science Redo -- Taking Stock of What You Already Have -- The tool overview -- Working with BI apps -- Accessing cloud tools -- Taking inventory and finding the gaps -- Adding Other Tools to the Mix -- Decision modeling software -- Business rule management systems -- Machine learning and model stores -- Data platforms.…”
Full text (MFA users only)
Electronic eBook -
334
A Statistical approach to genetic epidemiology : concepts and applications, with an e-Learning Platform.
Published 2012Table of Contents: “…; 4.3 HOW SHOULD GENOTYPING ERRORS BE CHECKED IN POPULATION-BASED STUDIES USING THE HARDY-WEINBERG EQUILIBRIUM?; Algorithm 4.1.; Algorithm 4.2.; Algorithm 4.3.; 4.4 HOW CAN GENOTYPING ERRORS BE DETECTED IN HIGH-THROUGHPUT GENOTYPING STUDIES?…”
Full text (MFA users only)
Electronic eBook -
335
Drones and other unmanned weapons systems under international law
Published 2018Full text (MFA users only)
Electronic eBook -
336
The Maudsley Prescribing Guidelines in Psychiatry
Published 2012Full text (MFA users only)
Electronic eBook -
337
Creating wicked students : designing courses for a complex world
Published 2018Full text (MFA users only)
Electronic eBook -
338
Applied mechanics and industrial technologies : selected, peer reviewed papers from the 2012 International Conference on Applied Mechanics and Manufacturing Technology (AMMT 2012),...
Published 2013Table of Contents: “…An Assessment of Wet Compression Process in Gas Turbine Systems with an Analytical ModelingAssessment of Hole Quality and Thrust Force when Drilling CFRP/Al Stack Using Carbide Tools; Multi-Objective Optimization of Filament Wound Composite Pressure Vessels Based on Weight and Matrix Cracking/ Burst Pressure Using Imperialist Competitive Algorithm; In Situ Laser Build-Up Welding of Shipboard Crankshafts; Stress and Deformation Analysis for Caster Segment Based on ANSYS; Instable Crack Propagation Analysis with PDS-FEM; Reducing the Manufacturing Cost by Using Combination Die.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
339
Hierarchical Protection for Smart Grids.
Published 2018Table of Contents: “…2.3.4 Adaptive Overload Identification Method Based on the Complex Phasor Plane2.3.5 Novel Fault Phase Selection Scheme Utilizing Fault Phase Selection Factors; 2.4 Summary; References; Chapter 3 Local Area Protection for Renewable Energy; 3.1 Introduction; 3.2 Fault Transient Characteristics of Renewable Energy Sources; 3.2.1 Mathematical Model and LVRT Characteristics of the DFIG; 3.2.2 DFIG Fault Transient Characteristics When Crowbar Protection Is Not Put into Operation; 3.2.3 DFIG Fault Transient Characteristics When Crowbar Protection Is Put into Operation.…”
Full text (MFA users only)
Electronic eBook -
340