Search Results - (((((((kent OR kwantis) OR wantsi) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 21
- Data processing 20
- Algorithms 15
- Mathematics 15
- algorithms 14
- Machine learning 13
- Mathematical models 12
- Technological innovations 12
- Data mining 11
- artificial intelligence 11
- Computer algorithms 10
- Management 10
- Computer networks 9
- Information technology 9
- Big data 8
- Neural networks (Computer science) 8
- Social aspects 7
- Artificial Intelligence 6
- Development 6
- Parallel processing (Electronic computers) 6
- methods 6
- Application software 5
- Bioinformatics 5
- Computer programming 5
- Computer science 5
- Cryptography 5
- Data Mining 5
- Data encryption (Computer science) 5
- High performance computing 5
- History 5
Search alternatives:
- kent »
-
141
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
142
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook -
143
Cryptography : protocols, design, and applications
Published 2012Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
Full text (MFA users only)
Electronic eBook -
144
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
145
Automatic Modeling and Fault Diagnosis of Timed Concurrent Discrete Event Systems : Automatische Modellierung und Fehlerdiagnose Zeitlicher Nebenläufiger Ereignisdiskreter Systeme....
Published 2015Table of Contents: “…3.3.3 Precision and Completeness Properties3.3.4 Identification Parameters; 3.4 Timed Distributed Modeling; 3.5 Identification of Timed Distributed Models; 3.5.1 Timed Distributed Identification Approach; 3.5.2 Precision and Completeness Properties; 3.5.3 Discussion on Shared I/Os; 3.6 Identification of Timed Distributed BMS Models; 3.6.1 Data Collection; 3.6.2 Timed Distributed Identification; 4 Partitioning of DES Models; 4.1 Preliminaries; 4.2 Causal Partitioning; 4.2.1 Distance and Causality; 4.2.2 Causal Partitioning Algorithm; 4.3 Optimal Partitioning; 4.3.1 Optimization Approach.…”
Full text (MFA users only)
Electronic eBook -
146
Parallel Programming with Python.
Published 2014Table of Contents: “…; Exploring common forms of parallelization; Communicating in parallel programming; Understanding shared state; Understanding message passing; Identifying parallel programming problems; Deadlock; Starvation; Race conditions; Discovering Python's parallel programming tools; The Python threading module; The Python multiprocessing module.…”
Full text (MFA users only)
Electronic eBook -
147
-
148
Data Science : The Executive Summary - a Technical Book for Non-Technical Professionals.
Published 2020Table of Contents: “…Chapter 3 Working with Modern Data -- 3.1 Unstructured Data and Passive Collection -- 3.2 Data Types and Sources -- 3.3 Data Formats -- 3.3.1 CSV Files -- 3.3.2 JSON Files -- 3.3.3 XML and HTML -- 3.4 Databases -- 3.4.1 Relational Databases and Document Stores -- 3.4.2 Database Operations -- 3.5 Data Analytics Software Architectures -- 3.5.1 Shared Storage -- 3.5.2 Shared Relational Database -- 3.5.3 Document Store + Analytics RDB -- 3.5.4 Storage + Parallel Processing -- Chapter 4 Telling the Story, Summarizing Data -- 4.1 Choosing What to Measure…”
Full text (MFA users only)
Electronic eBook -
149
Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006
Published 2006Table of Contents: “…Early Diagnosis of Alzheimer's Disease Using a Grid Implementation of Statistical Parametric Mapping AnalysisUsing the Grid to Analyze the Pharmacokinetic Modelling After Contrast Administration in Dynamic MRI; Medical Image Registration Algorithms Assessment: Bronze Standard Application Enactment on Grids Using the MOTEUR Workflow Engine; Ethical, Legal and Privacy Issues on HealthGrids; The Ban on Processing Medical Data in European Law: Consent and Alternative Solutions to Legitimate Processing of Medical Data in HealthGrid.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
150
Introduction to Modern Algebra and Its Applications.
Published 2020Full text (MFA users only)
Electronic eBook -
151
Database technology for life sciences and medicine
Published 2010Table of Contents: “…The DIANOVA framework. 4.4. Algorithms for realizing DIANOVA. 4.5. Extensions of DIANOVA. 4.6. …”
Full text (MFA users only)
Electronic eBook -
152
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
153
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook -
154
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
155
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
156
Innovation Manufacturing and Engineering Management : Selected, peer reviewed papers from the International Conference on Innovation Manufacturing and Engineering Management (IMEM)...
Published 2011Table of Contents: “…Application of DNA Genetic Algorithm in Manufacturing System Scheduling OptimizationSoft-Sensor for Estimation of Lead Slices Thickness in Continuous Casting Process; Hydrodynamic Mathematical Modeling of the Yangshan Deep-Water Harbor Waters, China; Multidisciplinary Design Method Taking Traditional Manufacturing Factors into Account; Research on the Seed-Fertilizer Box for a Ridge-Till and No-Till Seeder; Research on the Investment Decision-Making on the Application of Advanced Manufacturing Technologies in Enterprises; Zigbee-Based Data Acquisition System for Manufacturing…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
157
Mechanical, Electronic and Information Technology Engineering
Published 2015Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
158
Advanced Analytics with R and Tableau.
Published 2016Table of Contents: “…; How to do Clustering in Tableau; Creating Clusters; Clustering example in Tableau; Creating a Tableau group from cluster results; Constraints on saving Clusters; Interpreting your results; How Clustering Works in Tableau; The clustering algorithm; Scaling; Clustering without using k-means; Hierarchical modeling; Statistics for Clustering; Describing Clusters -- Summary tab; Testing your Clustering.…”
Full text (MFA users only)
Electronic eBook -
159
Towards 5G : Applications, Requirements and Candidate Technologies.
Published 2016Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
Full text (MFA users only)
Electronic eBook -
160