Search Results - (((((((kent OR wanting) OR cantee) OR arts) OR cantor) OR anne) OR warte) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 42
- Mathematical models 37
- Machine learning 34
- Artificial intelligence 30
- Mathematics 22
- Data mining 19
- artificial intelligence 18
- Computer networks 15
- Mathematical optimization 15
- Artificial Intelligence 13
- Neural networks (Computer science) 12
- Python (Computer program language) 12
- Computer simulation 11
- Data Mining 11
- Development 11
- History 11
- Machine Learning 11
- Security measures 11
- Algorithms 10
- Application software 10
- Digital techniques 10
- Electronic data processing 10
- Management 10
- methods 10
- Philosophy 9
- Social aspects 9
- algorithms 9
- Bioinformatics 8
- Diseases 8
- Technological innovations 8
Search alternatives:
- kent »
-
381
Joyce without borders : circulations, sciences, media, and mortal flesh
Published 2022Full text (MFA users only)
Electronic eBook -
382
Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web
Published 2010Full text (MFA users only)
Electronic Conference Proceeding eBook -
383
-
384
Handbook of convex optimization methods in imaging science
Published 2017Full text (MFA users only)
Electronic eBook -
385
Advanced Computational Electromagnetic Methods.
Published 2015Table of Contents: “…2.7 ADVANCED FORMS OF HIGH-ORDER FDTD ALGORITHMS -- REFERENCES -- 3.1 INTRODUCTION -- 3.2 FDTD CODE FOR MICROWAVE CIRCUIT SIMULATION -- 3.3 FDTD CODE USING CUDA -- 3.4 NUMERICAL RESULTS -- REFERENCES -- 4.1 INTRODUCTION -- 4.2 CURRENT STATE OF THE ART -- 4.3 FDTD EARTH-IONOSPHERE MODEL OVERVIEW -- 4.4 NEW MAGNETIZED IONOSPHERIC PLASMA ALGORITHM -- 4.5 STOCHASTIC FDTD (S-FDTD) -- 4.6 INPUT TO FDTD/S-FDTD EARTH-PLAMSA IONOSPHERE MODELS -- 4.7 CONCLUSIONS -- REFERENCES -- 5.1 INTRODUCTION -- 5.2 ENVIRONMENT REQUIREMENTS AND SETTINGS -- 5.3 CODE DEVELOPMENT -- 5.4 NUMERICAL RESULTS -- REFERENCES -- 6.1 FETI METHODS WITH ONE AND TWO LAGRANGE MULTIPLIERS -- 6.2 FETI-DP METHODS WITH ONE AND TWO LAGRANGE MULTIPLIERS -- 6.3 LM-BASED NONCONFORMAL FETI-DP METHOD -- 6.4 CE-BASED NONCONFORMAL FETI-DP METHOD -- 6.5 FETI-DP METHOD ENHANCED BY THE SECOND-ORDER TRANSMISSION CONDITION -- 6.6 HYBRID NONCONFORMAL FETI/CONFORMAL FETI-DP METHOD -- 6.7 NUMERICAL EXAMPLES -- 6.8 SUMMARY -- REFERENCES -- 7.1 NORMALIZED RESIDUAL ERROR -- 7.2 HIGH-ORDER TREATMENT OF SMOOTH TARGETS -- 7.3 THE DIPOLE ANTENNA -- 7.4 HIGH-ORDER TREATMENT OF WEDGE SINGULARITIES -- 7.5 HIGH-ORDER TREATMENT OF JUNCTIONS -- 7.7 PROSPECTS FOR CONTROLLED ACCURACY COMPUTATIONS IN THREE-DIMENSIONAL PROBLEMS -- 7.8 SUMMARY -- REFERENCES -- 8.1 INTRODUCTION -- 8.2 LOW RANK PROPERTY OF SUBMATRICES OF PARTITIONED IMPEDANCE MATRIX -- 8.3 PARTITIONING OF THE COMPUTATIONAL DOMAIN -- 8.4 LOW RANK MATRIX DECOMPOSITION -- 8.5 LOW RANK DECOMPOSITION OF MULTIPLE RIGHT SIDES -- 8.6 DIRECT SOLVER BASED ON BLOCK LU DECOMPOSITION -- 8.7 PARALLELIZATION VIA OPENMP AND BLAS LIBRARY -- 8.8 NUMERICAL EXAMPLES -- 8.9 SUMMARY -- REFERENCES -- 9.1 INTRODUCTION -- 9.2 PHYSICS-BASED MODELING FOR THE ANALYSIS OF THE MACHINE DRIVE -- 9.3 EQUIVALENT SOURCE MODELING -- 9.4 POWER CONVERTERS.…”
Full text (MFA users only)
Electronic eBook -
386
Special issue on Electromagnetic Fields in Electrical Engineering.
Published 2015Full text (MFA users only)
Electronic eBook -
387
Gradience in grammar : generative perspectives
Published 2006Full text (MFA users only)
Electronic eBook -
388
Methods and Interdisciplinarity
Published 2020Table of Contents: “…Simulation in geography and algorithmic thinking; 2.3.1. A difficult path; 2.3.2. …”
Full text (MFA users only)
Electronic eBook -
389
Automatic control in aerospace : Aerospace Control '94 : a postprint volume from the IFAC symposium, Palo Alto, California, USA, 12-16 September 1994
Published 1995Full text (MFA users only)
Electronic Conference Proceeding eBook -
390
-
391
Spectral sensing research for surface and air monitoring in chemical, biological and radiological defense and security applications
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
392
Creating wicked students : designing courses for a complex world
Published 2018Full text (MFA users only)
Electronic eBook -
393
IP multicast with applications to IPTV and mobile DVB-H
Published 2008Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
Full text (MFA users only)
Electronic eBook -
394
Electromagnetic Nondestructive Evaluation (XVII).
Published 2014Full text (MFA users only)
Electronic eBook -
395
Fractional order systems : modeling and control applications
Published 2010Table of Contents: “…Marquardt algorithm for the least squares estimation. 8.7. Fractional models for IPMC actuators.…”
Full text (MFA users only)
Electronic eBook -
396
Risk Modeling, Assessment, and Management.
Published 2015Table of Contents: “…Intro -- Title page -- Table of Contents -- Preface to the Fourth Edition -- The Companion Website -- Acknowledgments -- ACKNOWLEDGMENTS TO THE FIRST EDITION -- ACKNOWLEDGMENTS TO THE SECOND EDITION -- ACKNOWLEDGMENTS TO THE THIRD EDITION -- ACKNOWLEDGMENTS TO THE FOURTH EDITION -- Part I: Fundamentals of Risk Modeling, Assessment, and Management -- 1 The Art and Science of Systems and Risk Analysis -- 1.1 INTRODUCTION -- 1.2 SYSTEMS ENGINEERING -- 1.3 RISK ASSESSMENT AND MANAGEMENT -- 1.4 CONCEPT ROAD MAP -- 1.5 EPILOGUE -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
397
Symmetry and Perturbation Theory, Proceedings of the International Conference On SPT 2002.
Published 2003Full text (MFA users only)
Electronic eBook -
398
Educational Data Mining with R and Rattle.
Published 2016Table of Contents: “…1.4.3 Objectives1.5 R Data Mining Tool; 1.5.1 R Installation; 1.5.2 R Mining; 1.6 Rattle Data Mining Tool; 1.6.1 Rattle Installation; 1.6.2 Loading Rattle Package; 1.7 Reason for R and Rattle; Chapter 2 -- Emerging Research Directions in Educational Data Mining; 2.1 Introduction; 2.2 Prior Art Vis-à-vis of Research; 2.2.1 Educational Data Mining; 2.2.2 Data Mining Using R; 2.2.3 Mining Students' Academic Performance; 2.2.4 Factors Affecting on Students' Academic Performance; 2.2.5 Evaluation of Student Performance; 2.2.6 Knowledge Management System; 2.2.7 Placement Chance Prediction.…”
Full text (MFA users only)
Electronic eBook -
399
Advances in Intelligent Robotics and Collaborative Automation
Published 2015Full text (MFA users only)
Electronic eBook -
400
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook