Search Results - (((((((want OR cantini) OR mantis) OR wint) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 34
- Artificial intelligence 26
- Mathematics 26
- Machine learning 24
- Mathematical models 22
- Algorithms 15
- artificial intelligence 15
- Data mining 14
- Mathematical optimization 12
- Technological innovations 12
- algorithms 12
- Artificial Intelligence 11
- Digital techniques 11
- History 11
- Image processing 11
- Python (Computer program language) 11
- Computer networks 10
- Neural networks (Computer science) 10
- Social aspects 10
- Application software 9
- Development 9
- methods 9
- Computer graphics 8
- Data Mining 7
- Engineering 7
- Machine Learning 7
- computer graphics 7
- digital imaging 7
- Automation 6
- Computer algorithms 6
Search alternatives:
- mantis »
- wint »
-
361
At a distance : precursors to art and activism on the Internet
Published 2005Full text (MFA users only)
Electronic eBook -
362
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
363
Nano-Biomedical Engineering 2009 : Proceedings of the Tohoku University Global Centre of Excellence Programme Global Nano-Biomedical Engineering Education and Research Network Cent...
Published 2009Table of Contents: “…Achievement of mechanical assistance by an artificial myocardium using shape memory alloy fibre / Yasuyuki Shiraishi, Tomoyuki Yambe, Dai Homma. …”
Full text (MFA users only)
Electronic eBook -
364
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
365
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
366
Introduction to OFDM receiver design and simulation
Published 2020Table of Contents: “…2.2 Data Transmission Rate -- 2.3 Bandpass Signals -- 2.4 Digitally Modulated Signals -- 2.4.1 PAM -- 2.4.2 PSK -- 2.4.3 QAM -- 2.4.4 FSK -- 2.5 Pulse Shaping -- 2.6 Summary -- References -- 3 Multicarrier Modulation -- 3.1 Introduction -- 3.2 OFDM Waveform -- 3.3 OFDM Characteristics -- 3.3.1 Orthogonality -- 3.3.2 OFDM Spectrum -- 3.3.3 PAPR -- 3.3.4 Cyclic Prefix -- 3.3.5 FFT -- 3.4 Time and Frequency Parameters -- 3.5 Window Function -- 3.6 Digital Modulation -- 3.7 OFDM Waveform Properties -- 3.8 Summary -- References -- 4 OFDM Transmission -- 4.1 Introduction…”
Full text (MFA users only)
Electronic eBook -
367
Mechanical, Information and Industrial Engineering
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
368
Linear drives for industry applications IX : selected, peer reviewed papers from the 9th International Conference on Linear Drives for Industry Applications (LDIA 2013), July 7-10,...
Published 2013Table of Contents: “…Intro -- Linear Drives for Industry Applications IX -- Preface, Committees and Reviewers -- Table of Contents -- Chapter 1: Linear Motors and Other Electrical Machines -- Design and Analysis of a New Linear Fault-Tolerant Flux-Reversal Permanent-Magnet Machine -- Design of Dual-Rotor Radial Flux Permanent-Magnet Generator for Wind Power Applications -- Inductance and Flux Linkage Variation on Operation Performance for Multi-Segmented Linear PM Motor -- An Optimal Method for Minimizing Cogging Torque in Disc-Type Permanent Magnet Machines Using FEM and Genetic Algorithm -- Research on the End Effect Detent Force Reduction of Permanent Magnet Linear Synchronous Motor with Auxiliary Poles One-Piece Structure -- Performance Analysis of a Linear Motor with HTS Bulk Magnets for Driving a Prototype HTS Maglev Vehicle -- Design of a New Frog-Leg Winding Permanent-Magnet Brushless DC Motor -- Magnetic Shielding for Coreless Linear Permanent Magnet Motors -- Design and Experiment Analysis of Induction Machine Used in the Economical EV -- An Exact Analytical Solution of Halbach Arrays Permanent-Magnet Motor for Magnetic Field on Load -- Analysis, Design and Prototyping of a Low-Speed High-Torque Six-Phase Fault-Tolerant Permanent Magnet Synchronous Machine for EVs -- Investigation of a Single-Phase Oscillating PM Alternator for Free-Piston Stirling Engines -- Punching Machine Driver Research Based on Pulse Electromagnetic Force Actuator -- Characteristic Analysis of Moving Magnet Type Double-Sided Linear Synchronous Motor -- Gravity Neighborhood Estimation Algorithm Based for Cylinder Linear Motor Parameter Optimization -- Copper Losses and Rotor Losses Calculation for the BLDCM Used in a Flywheel Energy Storage System -- Optimal Design of a Double-Sided Permanent Magnet Linear Synchronous Motor for Ropeless Elevator System.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
369
Fuzzy Multiple Attribute Decision Making : Methods and Applications
Published 1992Full text (MFA users only)
Electronic eBook -
370
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
371
Cognitive radio communication and networking : principles and practice
Published 2012Table of Contents: “…10.3.3 Game Formulation 369 -- 10.3.4 Bayesian Equilibrium 370 -- 10.3.5 Numerical Results 371 -- 10.4 Games in Collaborative Spectrum Sensing 372 -- 10.4.1 False Report Attack 373 -- 10.4.2 Game Formulation 373 -- 10.4.3 Elements of Game 374 -- 10.4.4 Bayesian Equilibrium 376 -- 10.4.5 Numerical Results 379 -- 11 Cognitive Radio Network 381 -- 11.1 Basic Concepts of Networks 381 -- 11.1.1 Network Architecture 381 -- 11.1.2 Network Layers 382 -- 11.1.3 Cross-Layer Design 384 -- 11.1.4 Main Challenges in Cognitive Radio Networks 384 -- 11.1.5 Complex Networks 385 -- 11.2 Channel Allocation in MAC Layer 386 -- 11.2.1 Problem Formulation 386 -- 11.2.2 Scheduling Algorithm 387 -- 11.2.3 Solution 389 -- 11.2.4 Discussion 390 -- 11.3 Scheduling in MAC Layer 391 -- 11.3.1 Network Model 391 -- 11.3.2 Goal of Scheduling 393 -- 11.3.3 Scheduling Algorithm 393 -- 11.3.4 Performance of the CNC Algorithm 395 -- 11.3.5 Distributed Scheduling Algorithm 396 -- 11.4 Routing in Network Layer 396 -- 11.4.1 Challenges of Routing in Cognitive Radio 397 -- 11.4.2 Stationary Routing 398 -- 11.4.3 Dynamic Routing 402 -- 11.5 Congestion Control in Transport Layer 404 -- 11.5.1 Congestion Control in Internet 404 -- 11.5.2 Challenges in Cognitive Radio 405 -- 11.5.3 TP-CRAHN 406 -- 11.5.4 Early Start Scheme 408 -- 11.6 Complex Networks in Cognitive Radio 417 -- 11.6.1 Brief Introduction to Complex Networks 418 -- 11.6.2 Connectivity of Cognitive Radio Networks 421 -- 11.6.3 Behavior Propagation in Cognitive Radio Networks 423 -- 12 Cognitive Radio Network as Sensors 427 -- 12.1 Intrusion Detection by Machine Learning 429 -- 12.2 Joint Spectrum Sensing and Localization 429 -- 12.3 Distributed Aspect Synthetic Aperture Radar 429 -- 12.4 Wireless Tomography 433 -- 12.5 Mobile Crowdsensing 434 -- 12.6 Integration of 3S 435 -- 12.7 The Cyber-Physical System 435 -- 12.8 Computing 436 -- 12.8.1 Graphics Processor Unit 437 -- 12.8.2 Task Distribution and Load Balancing 437 -- 12.9 Security and Privacy 438.…”
Full text (MFA users only)
Electronic eBook -
372
Acoustic emission and durability of composite materials
Published 2018Full text (MFA users only)
Electronic eBook -
373
Designing and Researching of Machines and Technologies for Modern Manufacture.
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
374
-
375
Decision Intelligence for Dummies
Published 2022Table of Contents: “…Preventing Wrong Influences from Affecting Decisions -- Bad influences in AI and analytics -- The blame game -- Ugly politics and happy influencers -- Risk Factors in Decision Intelligence -- DI and Hyperautomation -- Part 5 The Part of Tens -- Chapter 17 Ten Steps to Setting Up a Smart Decision -- Check Your Data Source -- Track Your Data Lineage -- Know Your Tools -- Use Automated Visualizations -- Impact = Decision -- Do Reality Checks -- Limit Your Assumptions -- Think Like a Science Teacher -- Solve for Missing Data -- Partial versus incomplete data -- Clues and missing answers -- Take Two Perspectives and Call Me in the Morning -- Chapter 18 Bias In, Bias Out (and Other Pitfalls) -- A Pitfalls Overview -- Relying on Racist Algorithms -- Following a Flawed Model for Repeat Offenders -- Using A Sexist Hiring Algorithm -- Redlining Loans -- Leaning on Irrelevant Information -- Falling Victim to Framing Foibles -- Being Overconfident -- Lulled by Percentages -- Dismissing with Prejudice -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
376
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
377
Nonlinear science and complexity
Published 2007Table of Contents: “…Bruzón -- Applying a new algorithm to derive nonclassical symmetries / M.S. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
378
-
379
-
380
Stirling Cycle Engines : Inner Workings and Design.
Published 2013Table of Contents: “…-- 3.6 The way forward -- 4 Equivalence conditions for volume variations -- 4.1 Kinematic configuration -- 4.2 'Additional' dead space -- 4.3 Net swept volume -- 5 The optimum versus optimization -- 5.1 An engine from Turkey rocks the boat -- 5.2 ... and an engine from Duxford -- 5.3 Schmidt on Schmidt -- 5.3.1 Volumetric compression ratio rv -- 5.3.2 Indicator diagram shape -- 5.3.3 More from the re-worked Schmidt analysis -- 5.4 Crank-slider mechanism again -- 5.5 Implications for engine design in general -- 6 Steady-flow heat transfer correlations -- 6.1 Turbulent -- or turbulent? …”
Full text (MFA users only)
Electronic eBook