Search Results - (((((((kant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 37
- Data processing 36
- Mathematics 27
- Machine learning 26
- Algorithms 23
- Mathematical models 23
- artificial intelligence 23
- algorithms 22
- Data mining 20
- Technological innovations 19
- Computer algorithms 17
- Computer networks 16
- Artificial Intelligence 15
- Social aspects 14
- Big data 13
- Information technology 13
- Management 13
- methods 13
- Development 12
- Mathematical optimization 12
- Research 12
- Data Mining 11
- Application software 10
- Electronic data processing 10
- History 10
- Neural networks (Computer science) 10
- Diseases 9
- Philosophy 9
- Python (Computer program language) 9
- Computer simulation 8
Search alternatives:
- kant »
- wanti »
- mantis »
-
461
ModSecurity 2.5.
Published 2009Table of Contents: “…Filtering collection fields using a regular expressionBuilt-in fields; Transformation functions; Other operators; Set-based pattern matching with @pm and @pmFromFile; @pmFromFile; Performance of the phrase matching operators; Validating character ranges; Phases and rule ordering; Actions-what to do when a rule matches; Allowing requests; Blocking requests; Taking no action but continuing rule processing; Dropping requests; Redirecting and proxying requests; SecAction; Using the ctl action to control the rule engine; How to use the ctl action; Macro expansion; SecRule in practice.…”
Full text (MFA users only)
Electronic eBook -
462
Personality Revolution : Using AI to Understand Your Customers and Win More Business.
Published 2019Table of Contents: “…Cover; Title Page; Copyright Page; Contents; Introduction; Doubting the Usefulness of Personality Models; Joining the Personality Revolution; PART I The Truth About Personality: Making sense of human behavior in an unpredictable world; Chapter 1 The High Cost of Not Understanding People; Flying Blind in a Complicated World; Seeing Others Through the Lens of Personality; What Happens When Personalities Clash; How Crystal Got Started; Chapter 2 The Ingredients of a Unique Personality; Where Do Personality Differences Come From?…”
Full text (MFA users only)
Electronic eBook -
463
Concise encyclopaedia of bioinformatics and computational biology 2e
Published 2014Table of Contents: “….; Akaike Information Criterion; Pedro Larranaga and Concha Bielza; Algorithm; Matthew He; Alignment (Domain Alignment, Repeats Alignment); Jaap Heringa; Alignment Score; Laszlo Patthy; Allele-Sharing Methods (Non-parametric Linkage Analysis).…”
Full text (MFA users only)
Electronic eBook -
464
Digitalization of society and socio-political issues. 2, Digital, information, and research
Published 2020Table of Contents: “…6. When Vlogging Educates in Politics: The French Case of "Osons Causer" -- 6.1. …”
Full text (MFA users only)
Electronic eBook -
465
Networks-on-chip : from implementations to programming paradigms
Published 2014Table of Contents: “…Front Cover; Networks-on-Chip: From Implementations to Programming Paradigms; Copyright; Contents in Brief; Contents; Preface; About the Editor-in-Chief and Authors; Editor-in-Chief; Authors; Part I: Prologue; Chapter 1: Introduction; 1.1 The dawn of the many-core era; 1.2 Communication-centric cross-layer optimizations; 1.3 A baseline design space exploration of NoCs; 1.3.1 Topology; 1.3.2 Routing algorithm; 1.3.3 Flow control; 1.3.4 Router microarchitecture; 1.3.5 Performance metric; 1.4 Review of NoC research; 1.4.1 Research on topologies; 1.4.2 Research on unicast routing.…”
Full text (MFA users only)
Electronic eBook -
466
Advanced Computational Electromagnetic Methods.
Published 2015Table of Contents: “…1.7.1 A Symmetric Reflector Antenna -- 1.7.2 A Symmetric Reflector Antenna with an Elliptical Projected Aperture -- 1.7.3 Near-Field Prediction with Only Two Pattern Cuts -- 2.6.1 Planar PEC Boundaries -- 2.6.3 Critical Curved PEC Models -- 2.7.1 The Finite Volumes-Based FV24 Algorithm -- 2.7.2 High-Order Algorithms for Compact-FDTD Grids -- 3.2.1 Features of the FDTD Code -- 3.2.2 Input Parameters File -- 3.2.3 Main Program Layout -- 3.2.4 Field Updates -- 3.2.5 Outputs of the Program -- 3.3.1 Performance Optimization -- 3.3.2 Memory Accesses -- 3.3.3 Preparation of the GPU Device -- 3.3.4 Thread to Cell Mapping -- 3.3.5 The Time-Marching Loop -- 3.3.6 Field Updates -- 3.3.7 Source Updates and Output Calculations -- 4.3.1 FDTD Space Lattice -- 4.3.2 Example Updating Algorithm for TM Grid Cells -- 4.4.1 Collisional Plasma Algorithm -- 4.4.2 Two Example Validations -- 4.4.3 Summary of Performance -- 4.5.1 Overview -- 4.5.2 Mean Field Equations -- 4.5.3 Variance Field Equations -- 5.2.1 Hardware Configuration -- 5.2.2 Software Configuration -- 5.2.3 Compilation Environment -- 5.3.1 Performance Optimization -- 5.3.2 Memory Alignment -- 5.3.3 Parallel FDTD Implementation -- 5.3.4 Job Scheduling Strategy -- 5.3.5 FDTD Code Development -- 5.3.6 Matrix Multiplication -- 6.1.1 FETI Method with One Lagrange Multiplier -- 6.1.2 FETI Method with Two Lagrange Multipliers -- 6.1.3 Symbolic Formulation -- 6.2.1 FETI-DP Method with One Lagrange Multiplier -- 6.2.2 FETI-DP Method with Two Lagrange Multipliers -- 6.2.3 Comparison Between FETI-DP Methods with One and Two Lagrange Multipliers -- 6.3.1 Nonconformal Interface and Conformal Corner Meshes -- 6.3.2 Extension to Nonconformal Interface and Corner Meshes -- 6.4.1 Nonconformal Interface and Conformal Corner Meshes -- 6.4.2 Extension to Nonconformal Interface and Corner Meshes.…”
Full text (MFA users only)
Electronic eBook -
467
Mastering OpenCV with Practical Computer Vision Projects.
Published 2012Table of Contents: “…Reviewing the Android appCartoonifying the image when the user taps the screen; Saving the image to a file and to the Android picture gallery; Showing an Android notification message about a saved image; Changing cartoon modes through the Android menu bar; Reducing the random pepper noise from the sketch image; Showing the FPS of the app; Using a different camera resolution; Customizing the app; Summary; 2. …”
Full text (MFA users only)
Electronic eBook -
468
D Cookbook.
Published 2014Table of Contents: “…Performing type conversionsFinding the largest files in a directory; Creating a network client and server; Using Base64 to create a data URI; Generating random numbers; Normalizing a string and performing Unicode comparisons; Searching with regular expressions; Writing a digest utility; Using std.zlib compression; Using the std.json module; Chapter 3: Ranges; Introduction; Using ranges when implementing an algorithm; Creating an input range; Creating an output range; Creating a higher-order range; Putting a range interface on a collection; Creating an input range over a tree structure…”
Full text (MFA users only)
Electronic eBook -
469
Optimized cloud resource management and scheduling : theories and practice
Published 2015Full text (MFA users only)
Electronic eBook -
470
Open science by design : realizing a vision for 21st century research
Published 2018Full text (MFA users only)
Electronic eBook -
471
Integration of swarm intelligence and artificial neural network
Published 2011Full text (MFA users only)
Electronic eBook -
472
Social-behavioral modeling for complex systems
Published 2019Full text (MFA users only)
Electronic eBook -
473
Big data and differential privacy : analysis strategies for railway track engineering
Published 2017Full text (MFA users only)
Electronic eBook -
474
Linear Models.
Published 2016Table of Contents: “…(Gauss-Markov Theorem) -- e Least-squares Theory When The Parameters are Random Variables -- 4 Consequences of Estimation -- a Unbiasedness -- b Variances -- c Estimating E(y)…”
Full text (MFA users only)
Electronic eBook -
475
Large Scale Network-Centric Distributed Systems
Published 2014Full text (MFA users only)
Electronic eBook -
476
Intelligent computational systems : a multi-disciplinary perspective
Published 2017Full text (MFA users only)
Electronic eBook -
477
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
478
Contemporary Ring Theory 2011 : Proceedings of the Sixth China-japan-korea International Conference on Ring Theory.
Published 2012Table of Contents: “…Abelian rings and uniquely clean rings; References; WHEN DO THE DIRECT SUMS OF MODULES INHERIT CERTAIN PROPERTIES? …”
Full text (MFA users only)
Electronic eBook -
479
The Big Bang Theory and Philosophy : Rock, Paper, Scissors, Aristotle, Locke
Published 2012Table of Contents: “…; The Giant "Hedon" Collider; The Egoism Polarization; The Social Contract Instability; The Aristotelian Virtue Vortex; The Dennis Kim Conundrum; Part Three: "Perhaps You Mean A Different Thing Than I Do When You Say 'Science'"; Chapter 7: Getting Fundamental about Doing Physics in The Big Bang Theory; Studies in Sheldonology; A Unified Theory of Sheldon?…”
Full text (MFA users only)
Electronic eBook -
480