Search Results - (((((((want OR manthe) OR find) OR mantis) OR cantor) OR anne) OR halted) OR granting) algorithms.

  1. 161

    Randomness and complexity : from Leibniz to Chaitin

    Published 2007
    Table of Contents: “…Martin Davis -- The Turing Post Language -- Codes for Turing Post Programs -- The Universal Program -- The Halting Problem -- Other Unsolvable Problems -- Undecidable Statements -- Complexity and Randomness -- Unsolvability of Halting Problem -- An Unsolvable Word Problem -- 6. …”
    Full text (MFA users only)
    Electronic eBook
  2. 162

    Pattern Recognition in Computational Molecular Biology : Techniques and Approaches by Elloumi, Mourad, Iliopoulos, Costas, Wang, Jason T. L., Zomaya, Albert Y.

    Published 2015
    Table of Contents: “…2.4 Techniques for Proving Inapproximability Results for String Barcoding Problems2.5 Heuristic Algorithms for String Barcoding Problems; 2.6 Conclusion; Acknowledgments; References; Chapter 3: Alignment-Free Measures for Whole-Genome Comparison; 3.1 Introduction; 3.2 Whole-Genome Sequence Analysis; 3.3 Underlying Approach; 3.4 Experimental Results; 3.5 Conclusion; Author's Contributions; 3.6 Acknowledgments; References; Chapter 4: A Maximum Likelihood Framework for Multiple Sequence Local Alignment; 4.1 Introduction; 4.2 Multiple Sequence Local Alignment; 4.3 Motif Finding Algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Machine Learning with Core ML : an IOS Developer's Guide to Implementing Machine Learning in Mobile Apps. by Newnham, Joshua

    Published 2018
    Table of Contents: “…Learning algorithms Auto insurance in Sweden; Supported learning algorithms; Considerations ; Summary; Chapter 3: Recognizing Objects in the World; Understanding images; Recognizing objects in the world; Capturing data ; Preprocessing the data; Performing inference ; Summary ; Chapter 4: Emotion Detection with CNNs; Facial expressions; Input data and preprocessing ; Bringing it all together; Summary ; Chapter 5: Locating Objects in the World; Object localization and object detection ; Converting Keras Tiny YOLO to Core ML; Making it easier to find photos; Optimizing with batches; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Regression Analysis with Python. by Massaron, Luca, Boschetti, Alberto

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Handbook of power systems. II

    Published 2010
    Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Apache Spark for Data Science Cookbook. by Chitturi, Padma Priya

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  8. 168
  9. 169

    Placement preparation : more than 1000 questions by Parthasarathy, S.

    Published 2006
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Recent advances in hybrid metaheuristics for dataclustering

    Published 2020
    Table of Contents: “…2.3.5 Term Weight (TF-IDF) -- 2.4 Text Feature Selection -- 2.4.1 Mathematical Model of the Feature Selection Problem -- 2.4.2 Solution Representation -- 2.4.3 Fitness Function -- 2.5 Harmony Search Algorithm -- 2.5.1 Parameters Initialization -- 2.5.2 Harmony Memory Initialization -- 2.5.3 Generating a New Solution -- 2.5.4 Update Harmony Memory -- 2.5.5 Check the Stopping Criterion -- 2.6 Text Clustering -- 2.6.1 Mathematical Model of the Text Clustering -- 2.6.2 Find Clusters Centroid -- 2.6.3 Similarity Measure -- 2.7 k-means text clustering algorithm -- 2.8 Experimental Results…”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Compressed sensing : theory and applications

    Published 2012
    Table of Contents: “…Graphical models concepts in compressed sensing / Andrea Montanari -- 10. Finding needles in compressed haystacks / Robert Calderbank and Sina Jafarpour -- 11. …”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Applications of swarm intelligence

    Published 2011
    Table of Contents: “…Algorithm for Ms3 ""; ""4.4. Ms4: Combination of Ms1 and Ms2 ""; ""4.5. …”
    Full text (MFA users only)
    Electronic eBook
  13. 173
  14. 174
  15. 175
  16. 176

    Implementing cryptography using Python by Bray, Shannon, 1972-

    Published 2020
    Table of Contents: “…Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering…”
    Full text (MFA users only)
    Electronic eBook
  17. 177
  18. 178

    Machine Learning for Asset Management New Developments and Financial Applications

    Published 2020
    Table of Contents: “…Significant features -- 2.5. Results and findings -- 2.5.1. Descriptive statistics of the data -- 2.5.2. …”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    The Method of Fundamental Solutions. by LI, Zi-Cai

    Published 2023
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Electronic warfare target location methods by Poisel, Richard

    Published 2012
    Full text (MFA users only)
    Electronic eBook