Search Results - (((((((kant OR wanting) OR semantic) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 44
- Artificial intelligence 37
- Mathematics 34
- Machine learning 30
- Mathematical models 27
- Data mining 22
- Algorithms 17
- Technological innovations 17
- artificial intelligence 16
- algorithms 15
- Computer science 13
- Python (Computer program language) 13
- Artificial Intelligence 12
- Computer networks 12
- Data Mining 12
- Automatic control 11
- Neural networks (Computer science) 11
- methods 10
- Big data 9
- Computer algorithms 9
- Engineering 9
- Image processing 9
- Information technology 9
- Machine Learning 9
- Materials 9
- Application software 8
- Development 8
- Electric power systems 8
- Graph theory 8
- Management 8
Search alternatives:
-
181
CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).
Published 2018Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
Full text (MFA users only)
Electronic eBook -
182
Language and logos : studies in theoretical and computational linguistics
Published 2010Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
Full text (MFA users only)
Electronic eBook -
183
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
184
Generative design
Published 2015Table of Contents: “…Intro; 1.0 Introduction to Generative Design; 2.0 Continuous Surfaces; 3.0 Modularity and Accumulation; 4.0 Deformation and Subtraction; 5.0 Algorithmic Patterns; 6.0 Triangulation ; 7.0 Conclusion: The Digital Vs Physical Debate ; Bibliography ; Index; Picture Credits; Acknowledgements; 1.1 Design methods in architecture: A brief review; 1.2 Generative form-finding processes; 1.3 The approach of this book; 2.1 Soft mesh; 2.2 Double-curved shells; 2.3 Hyper paraboloids; 3.1 Interlocking units; 3.2 Irregular units; 4.1 Twisted block; 4.2 Porous space; 5.1 Tessellated planes…”
Full text (MFA users only)
Electronic eBook -
185
Inverse problems of vibrational spectroscopy
Published 1999Table of Contents: “…Angle between a bond and the plane of an atomic triple -- 4.3.5. Angle between two planes (torsion coordinate) -- 4.3.6. …”
Full text (MFA users only)
Electronic eBook -
186
Advanced Methods and Technologies for Agent and Multi-Agent Systems.
Published 2013Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
Full text (MFA users only)
Electronic eBook -
187
Visual Data Mining : The VisMiner Approach.
Published 2012Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
Full text (MFA users only)
Electronic eBook -
188
Advances in structures analysis : special topic volume with invited peer reviewed papers only
Published 2011Full text (MFA users only)
Electronic eBook -
189
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
190
Handbook on semidefinite, conic and polynomial optimization
Published 2012Table of Contents: “…Lasserre and Mihai Putinar -- Self-regular interior-point methods for semidefinite optimization / Maziar Salahi and Tamás Terlaky -- Elementary optimality conditions for nonlinear SDPs / Florian Jarre -- Recent progress in interior-point methods: cutting-plane algorithms and warm starts / Alexander Engau -- Exploiting sparsity in SDP relaxation of polynomial optimization problems / Sunyoung Kim and Masakazu Kojima -- Block coordinate descent methods for semidefinite programming / Zaiwen Wen, Donald Goldfarb, and Katya Scheinberg -- Projection methods in conic optimization / Didier Henrion and Jérôme Malick -- SDP relaxations for non-commutative polynomial optimization / Miguel Navascués, Stefano Pironio, and Antonio Acín -- Semidefinite programming and constraint programming / Willem-Jan van Hoeve -- The state-of-the-art in conic optimization software / Hans D. …”
Full text (MFA users only)
Electronic eBook -
191
Compressed sensing : theory and applications
Published 2012Full text (MFA users only)
Electronic eBook -
192
Digital Signal Processing and Applications with the OMAP - L138 EXperimenter.
Published 2012Table of Contents: “…5.2 Development of the FFT Algorithm with Radix-2 -- 5.3 Decimation-In-Frequency FFT Algorithm with Radix-2 -- 5.4 Decimation-In-Time FFT Algorithm with RADIX-2 -- 5.4.1 Reordered Sequences in the Radix-2 FFT and Bit-Reversed Addressing -- 5.5 Decimation-In-Frequency FFT Algorithm with Radix-4 -- 5.6 Inverse Fast Fourier Transform -- 5.7 Programming Examples Using C Code -- 5.7.1 Frame- or Block-Based Processing -- 5.7.2 Fast Convolution -- References -- 6. …”
Full text (MFA users only)
Electronic eBook -
193
-
194
Rarefied Gas Dynamics : Theory and Simulations.
Published 2000Table of Contents: “…Mathematical Techniques""; ""Plane Waves in a Multispeed Discrete Velocity Gas""; ""Fluctuations for a Many-Particle System""; ""Deterministic Method for Solving the Boltzmann Equation""; ""Implicit Methods for Kinetic Equations""; ""Theoretical Comparison of Stochastic Particle Methods in Rarefied Gas Dynamics""…”
Full text (MFA users only)
Electronic eBook -
195
Advances in intelligent structure and vibration control : selected, peer reviewed papers from the International Conference on Intelligent Structure and Vibration Control (ISVC 2012...
Published 2012Table of Contents: “…Influences of Heat Treatment on Spinning Process with Large Thinning Rate and Performance of 30CrMnSiAThe DNA Genetic Algorithm Applied for Solving Optimal Placement of Sensors; Research on an Improved Cellular Automata Model; Control Algorithm Research of Electric Actuator Based on Switched Reluctance Motor; Study on Structure Including Interface Based on Interface Stress Element Method; A Probability Assessment Method for Degradation of Bridge Power MOSFET Circuit Based on Common Turn-On State…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
196
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
197
Monte Carlo methods and applications : proceedings of the 8th IMACS Seminar on Monte Carlo Methods, August 29-September 2, 2011, Borovets, Bulgaria
Published 2013Table of Contents: “…9.3 General Description of the Coupled Atmosphere Fire Modeling and WRF-Fire9.4 Wind Simulation Approach; 9.5 Conclusion; 10 Wireless Sensor Network Layout; 10.1 Introduction; 10.2 Wireless Sensor Network Layout Problem; 10.3 ACO for WSN Layout Problem; 10.4 Experimental Results; 10.5 Conclusion; 11 A Two-Dimensional Lorentzian Distribution for an Atomic Force Microscopy Simulator; 11.1 Introduction; 11.2 Modeling Oxidation Kinetics; 11.3 Development of the Lorentzian Model; 11.3.1 Algorithm for the Gaussian Model; 11.3.2 Development of the Lorentzian Model; 11.4 Conclusion.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
198
Implementing cryptography using Python
Published 2020Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
Full text (MFA users only)
Electronic eBook -
199
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
200
Advanced manufacturing and industrial engineering : selected, peer reviewed papers from the 4th International Conference on Advanced Engineering Materials and Technology (AEMT 2014...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook