Search Results - (((((((want OR canton) OR span) OR wanting) OR cantor) OR anne) OR carter) OR wansing) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 21
- Artificial intelligence 19
- Machine learning 19
- Data mining 15
- Mathematics 13
- artificial intelligence 11
- Mathematical models 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- methods 10
- Application software 9
- Computer networks 9
- Development 9
- Artificial Intelligence 8
- Algorithms 7
- Data Mining 7
- Graph theory 7
- Machine Learning 7
- R (Computer program language) 6
- algorithms 6
- Bioinformatics 5
- Computer security 5
- Computer simulation 5
- Electronic data processing 5
- History 5
- Neural Networks, Computer 5
- Social aspects 5
- Technological innovations 5
- Algebras, Linear 4
- Computational biology 4
Search alternatives:
-
201
The next economic disaster : why it's coming and how to avoid it
Published 2014Full text (MFA users only)
Electronic eBook -
202
Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture
Published 2019Table of Contents: “…The Digitalization of Cultural Policies in France 149; Anne BELLON 14.1.…”
Full text (MFA users only)
Electronic eBook -
203
Other geographies : the influences of Michael Watts
Published 2017Full text (MFA users only)
Electronic eBook -
204
Millimeter-wave digitally intensive frequency generation in CMOS
Published 2015Full text (MFA users only)
Electronic eBook -
205
Integration of swarm intelligence and artificial neural network
Published 2011Full text (MFA users only)
Electronic eBook -
206
-
207
Statistical learning from a regression perspective
Published 2008Full text (MFA users only)
Electronic eBook -
208
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
209
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…Simari -- Automated Deployment of Argumentation Protocols / Michael Rovatsos -- On Preferred Extension Enumeration in Abstract Argumentation / Katie Atkinson -- Towards Experimental Algorithms for Abstract Argumentation / Katie Atkinson.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
210
Design optimization of fluid machinery : applying computational fluid dynamics and numerical optimization
Published 2019Table of Contents: “…2.2.5.3 Periodic/Cyclic Boundary Conditions2.2.5.4 Symmetry Boundary Conditions; 2.2.6 Moving Reference Frame (MRF); 2.2.7 Verification and Validation; 2.2.8 Commercial CFD Software; 2.2.9 Open Source Codes; 2.2.9.1 OpenFOAM; References; Chapter 3 Optimization Methodology; 3.1 Introduction; 3.1.1 Engineering Optimization Definition; 3.1.2 Design Space; 3.1.3 Design Variables and Objectives; 3.1.4 Optimization Procedure; 3.1.5 Search Algorithm; 3.2 Multi-Objective Optimization (MOO); 3.2.1 Weighted Sum Approach; 3.2.2 Pareto-Optimal Front…”
Full text (MFA users only)
Electronic eBook -
211
Designing and Researching of Machines and Technologies for Modern Manufacture.
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
212
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
213
Fuzzy Multiple Attribute Decision Making : Methods and Applications
Published 1992Full text (MFA users only)
Electronic eBook -
214
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
215
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
216
Cybersecurity Law, standards and regulations
Published 2020Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
Full text (MFA users only)
Electronic eBook -
217
IBM TotalStorage : SAN product, design, and optimization guide
Published 2005Table of Contents: “…3.2.8 Communication -- 3.3 Buffers -- 3.4 Addressing -- 3.4.1 World Wide Name -- 3.4.2 WWN and WWPN -- 3.4.3 24-bit port address -- 3.4.4 Loop address -- 3.4.5 FICON addressing -- 3.5 Fabric services -- 3.5.1 Management services -- 3.5.2 Time services -- 3.5.3 Name services -- 3.5.4 Login services -- 3.5.5 Registered State Change Notification -- 3.6 Logins -- 3.6.1 Fabric login -- 3.6.2 Port login -- 3.6.3 Process login -- 3.7 Path routing mechanisms -- 3.7.1 Spanning tree -- 3.7.2 Fabric Shortest Path First -- 3.7.3 What is FSPF? …”
Full text (MFA users only)
Electronic eBook -
218
-
219
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
220
Concise dictionary of engineering : a guide to the language of engineering
Published 2014Full text (MFA users only)
Electronic eBook