Search Results - (((((((kant OR wanting) OR semantic) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.

  1. 181

    CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260). by Singh, Glen D.

    Published 2018
    Table of Contents: “…Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Language and logos : studies in theoretical and computational linguistics

    Published 2010
    Table of Contents: “…CONTENTS -- Preface -- Part I Syntax -- A Spurious Genitive Puzzle in Polish -- Semantic Type Effects on Crossing Movement in German -- Me and Chomsky -- On the Typology of Verb Second -- Movement from Verb-Second Clauses Revisited -- Spurious Ambiguities and the Parentheticals Debate -- Part II Semantics -- On Squeamishness of the Royal Kind -- Information Structure of schon -- When- Clauses, Factive Verbs and Correlates -- The Proof Theory of Partial Variables -- Brentano's Apple -- How to Interpret Expletive Negation under bevor in German…”
    Full text (MFA users only)
    Electronic eBook
  3. 183

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 184

    Generative design by Agkathidis, Asterios, 1974-

    Published 2015
    Table of Contents: “…Intro; 1.0 Introduction to Generative Design; 2.0 Continuous Surfaces; 3.0 Modularity and Accumulation; 4.0 Deformation and Subtraction; 5.0 Algorithmic Patterns; 6.0 Triangulation ; 7.0 Conclusion: The Digital Vs Physical Debate ; Bibliography ; Index; Picture Credits; Acknowledgements; 1.1 Design methods in architecture: A brief review; 1.2 Generative form-finding processes; 1.3 The approach of this book; 2.1 Soft mesh; 2.2 Double-curved shells; 2.3 Hyper paraboloids; 3.1 Interlocking units; 3.2 Irregular units; 4.1 Twisted block; 4.2 Porous space; 5.1 Tessellated planes…”
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Inverse problems of vibrational spectroscopy by Yagola, A. G.

    Published 1999
    Table of Contents: “…Angle between a bond and the plane of an atomic triple -- 4.3.5. Angle between two planes (torsion coordinate) -- 4.3.6. …”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    Advanced Methods and Technologies for Agent and Multi-Agent Systems. by Edited by

    Published 2013
    Table of Contents: “…""Role and Member Selection in Team Formation Using Resource Estimation""""Incorporating Explicit Coordination Mechanisms by Agents to Obtain Green Waves""; ""Communication Leading to Coalition Nash Equilibrium I""; ""Agent-Based Optimization""; ""An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows""; ""Mobile Agent-based Dynamic Resource Allocation Method for Query Optimization in Data Grid Systems""; ""Memetic Multi-Agent Computing in Difficult Continuous Optimisation""; ""Web Services and Semantic Web""…”
    Full text (MFA users only)
    Electronic eBook
  7. 187

    Visual Data Mining : The VisMiner Approach. by Anderson, Russell K.

    Published 2012
    Table of Contents: “…Regression Analysis -- The Regression Model -- Correlation and Causation -- Algorithms for Regression Analysis -- Assessing Regression Model Performance -- Model Validity -- Looking Beyond R2 -- Polynomial Regression -- Artificial Neural Networks for Regression Analysis -- Dataset Preparation -- Tutorial -- A Regression Model for Home Appraisal -- Modeling with the Right Set of Observations -- Exercise 6.1 -- ANN Modeling -- The Advantage of ANN Regression -- Top-Down Attribute Selection -- Issues in Model Interpretation -- Model Validation -- Model Application -- Summary…”
    Full text (MFA users only)
    Electronic eBook
  8. 188
  9. 189

    DSP with Python Programming. by Charbit, Maurice

    Published 2017
    Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Handbook on semidefinite, conic and polynomial optimization

    Published 2012
    Table of Contents: “…Lasserre and Mihai Putinar -- Self-regular interior-point methods for semidefinite optimization / Maziar Salahi and Tamás Terlaky -- Elementary optimality conditions for nonlinear SDPs / Florian Jarre -- Recent progress in interior-point methods: cutting-plane algorithms and warm starts / Alexander Engau -- Exploiting sparsity in SDP relaxation of polynomial optimization problems / Sunyoung Kim and Masakazu Kojima -- Block coordinate descent methods for semidefinite programming / Zaiwen Wen, Donald Goldfarb, and Katya Scheinberg -- Projection methods in conic optimization / Didier Henrion and Jérôme Malick -- SDP relaxations for non-commutative polynomial optimization / Miguel Navascués, Stefano Pironio, and Antonio Acín -- Semidefinite programming and constraint programming / Willem-Jan van Hoeve -- The state-of-the-art in conic optimization software / Hans D. …”
    Full text (MFA users only)
    Electronic eBook
  11. 191

    Compressed sensing : theory and applications

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  12. 192

    Digital Signal Processing and Applications with the OMAP - L138 EXperimenter. by Reay, Donald S.

    Published 2012
    Table of Contents: “…5.2 Development of the FFT Algorithm with Radix-2 -- 5.3 Decimation-In-Frequency FFT Algorithm with Radix-2 -- 5.4 Decimation-In-Time FFT Algorithm with RADIX-2 -- 5.4.1 Reordered Sequences in the Radix-2 FFT and Bit-Reversed Addressing -- 5.5 Decimation-In-Frequency FFT Algorithm with Radix-4 -- 5.6 Inverse Fast Fourier Transform -- 5.7 Programming Examples Using C Code -- 5.7.1 Frame- or Block-Based Processing -- 5.7.2 Fast Convolution -- References -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  13. 193

    Numerical Methods in Contact Mechanics. by Yastrebov, Vladislav A.

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Rarefied Gas Dynamics : Theory and Simulations. by Shizgal, Bernie D.

    Published 2000
    Table of Contents: “…Mathematical Techniques""; ""Plane Waves in a Multispeed Discrete Velocity Gas""; ""Fluctuations for a Many-Particle System""; ""Deterministic Method for Solving the Boltzmann Equation""; ""Implicit Methods for Kinetic Equations""; ""Theoretical Comparison of Stochastic Particle Methods in Rarefied Gas Dynamics""…”
    Full text (MFA users only)
    Electronic eBook
  15. 195

    Advances in intelligent structure and vibration control : selected, peer reviewed papers from the International Conference on Intelligent Structure and Vibration Control (ISVC 2012...

    Published 2012
    Table of Contents: “…Influences of Heat Treatment on Spinning Process with Large Thinning Rate and Performance of 30CrMnSiAThe DNA Genetic Algorithm Applied for Solving Optimal Placement of Sensors; Research on an Improved Cellular Automata Model; Control Algorithm Research of Electric Actuator Based on Switched Reluctance Motor; Study on Structure Including Interface Based on Interface Stress Element Method; A Probability Assessment Method for Degradation of Bridge Power MOSFET Circuit Based on Common Turn-On State…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 196

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Monte Carlo methods and applications : proceedings of the 8th IMACS Seminar on Monte Carlo Methods, August 29-September 2, 2011, Borovets, Bulgaria

    Published 2013
    Table of Contents: “…9.3 General Description of the Coupled Atmosphere Fire Modeling and WRF-Fire9.4 Wind Simulation Approach; 9.5 Conclusion; 10 Wireless Sensor Network Layout; 10.1 Introduction; 10.2 Wireless Sensor Network Layout Problem; 10.3 ACO for WSN Layout Problem; 10.4 Experimental Results; 10.5 Conclusion; 11 A Two-Dimensional Lorentzian Distribution for an Atomic Force Microscopy Simulator; 11.1 Introduction; 11.2 Modeling Oxidation Kinetics; 11.3 Development of the Lorentzian Model; 11.3.1 Algorithm for the Gaussian Model; 11.3.2 Development of the Lorentzian Model; 11.4 Conclusion.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 198

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  20. 200