Search Results - (((((((want OR mantis) OR semantic) OR kind) OR cantor) OR anne) OR plane) OR hints) algorithms.

  1. 481

    Behavioral computational social science by Boero, Riccardo

    Published 2015
    Table of Contents: “…7.1 Essential elements of SNA7.2 Models for the generation of social networks; 7.3 Other kinds of interaction structures; 7.4 Critical issues: Time and behavior; Chapter 8An example of application; 8.1 The social dilemma; 8.1.1 The theory; 8.1.2 Evidence; 8.1.3 Our research agenda; 8.2 The original experiment; 8.3 Behavioral agents; 8.3.1 Fixed effects model; 8.3.2 Random coefficients model; 8.3.3 First differences model; 8.3.4 Ordered probit model with individual dummies; 8.3.5 Multilevel decision trees; 8.3.6 Classified heuristics; 8.4 Learning agents; 8.5 Interaction structures.…”
    Full text (MFA users only)
    Electronic eBook
  2. 482
  3. 483

    Microwave and millimeter wave circuits and systems : emerging design, technologies, and applications

    Published 2012
    Table of Contents: “…1.1.7 MBF Model -- the Memoryless PA Behavioural Model of ChoiceAcknowledgements; References; 2 Artificial Neural Network in Microwave Cavity Filter Tuning; 2.1 Introduction; 2.2 Artificial Neural Networks Filter Tuning; 2.2.1 The Inverse Model of the Filter; 2.2.2 Sequential Method; 2.2.3 Parallel Method; 2.2.4 Discussion on the ANN's Input Data; 2.3 Practical Implementation -- Tuning Experiments; 2.3.1 Sequential Method; 2.3.2 Parallel Method; 2.4 Influence of the Filter Characteristic Domain on Algorithm Efficiency; 2.5 Robots in the Microwave Filter Tuning; 2.6 Conclusions; Acknowledgement…”
    Full text (MFA users only)
    Electronic eBook
  4. 484
  5. 485
  6. 486

    Energy efficient distributed computing systems

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  7. 487
  8. 488

    Multi-dimensional Imaging. by Javidi, Bahram

    Published 2014
    Table of Contents: “…10.2 Digital Holography 226 -- 10.3 Metal Nanoparticles 227 -- 10.4 Resolution Enhancement in Digital Holography 229 -- 10.5 Field of View Enhancement in Digital Holography 231 -- 10.6 Eliminating the DC Term and the Twin Images 233 -- 10.7 Additional Applications 235 -- Part III MULTI-DIMENSIONAL IMAGING AND DISPLAY -- 11 Three-Dimensional Integral Imaging and Display 243 / Manuel Martƒinez-Corral, Adriǹ Dorado, Anabel LLavador, Genaro Saavedra and Bahram Javidi -- 11.1 Introduction 243 -- 11.2 Basic Theory 245 -- 11.3 The Plenoptic Function 246 -- 11.4 Methods for the Capture of the Plenoptic Field 249 -- 11.5 Walking in Plenoptic Space 255 -- 11.6 Reconstruction of Intensity Distribution in Different Depth Planes 257 -- 11.7 Implementation of the Integral Imaging Display Device 261 -- 11.8 Conclusion 262 -- 12 Image Formats of Various 3-D Displays 267 / Jung-Young Son, Chun-Hea Lee, Wook-Ho Son, Min-Chul Park and Bahram Javidi -- 12.1 Chapter Overview 267 -- 12.2 Introduction 268 -- 12.3 Multiplexing Schemes 269 -- 12.4 Image Formats for 3-D Imaging 271 -- 13 Ray-based and Wavefront-based 3D Representations for Holographic Displays 303 / Masahiro Yamaguchi and Koki Wakunami -- 13.1 Introduction 303 -- 13.2 Ray-based and Wavefront-based 3D Displays 303 -- 13.3 Conversion between Ray-based and Wavefront 3D Representations 307 -- 13.4 Hologram Printer Based on a Full-Parallax Holographic Stereogram 308 -- 13.5 Computational Holography Using a Ray-Sampling Plane 310 -- 13.6 Occlusion Culling for Computational Holography Using the Ray-Sampling Plane 313 -- 13.7 Scanning Vertical Camera Array for Computational Holography 315 -- 13.8 Conclusion and Future Issues 323 -- 14 Rigorous Diffraction Theory for 360 Computer-Generated Holograms 327 / Toyohiko Yatagai, Yusuke Sando and Boaz Jessie Jackin -- 14.1 Introduction 327 -- 14.2 Three-Dimensional Object and Its Diffracted Wavefront 328 -- 14.3 Point-Spread Function Approach for Spherical Holography 333 -- 14.4 Rigorous Point-Spread Function Approach 336.…”
    Full text (MFA users only)
    Electronic eBook
  9. 489

    D Cookbook. by D. Ruppe, Adam

    Published 2014
    Table of Contents: “…Performing type conversionsFinding the largest files in a directory; Creating a network client and server; Using Base64 to create a data URI; Generating random numbers; Normalizing a string and performing Unicode comparisons; Searching with regular expressions; Writing a digest utility; Using std.zlib compression; Using the std.json module; Chapter 3: Ranges; Introduction; Using ranges when implementing an algorithm; Creating an input range; Creating an output range; Creating a higher-order range; Putting a range interface on a collection; Creating an input range over a tree structure…”
    Full text (MFA users only)
    Electronic eBook
  10. 490

    CCNA Security Study Guide : Exam 210-260. by McMillan, Troy

    Published 2018
    Table of Contents: “…-- Certification Exam Policies -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Understanding Security Fundamentals -- Goals of Security -- Network Topologies -- Common Network Security Zones -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Understanding Security Threats -- Common Network Attacks -- Social Engineering -- Malware -- Data Loss and Exfiltration -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Understanding Cryptography -- Symmetric and Asymmetric Encryption -- Hashing Algorithms -- Key Exchange -- Public Key Infrastructure -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Securing the Routing Process -- Securing Router Access -- Implementing OSPF Routing Update Authentication -- Securing the Control Plane -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Understanding Layer 2 Attacks -- Understanding STP Attacks -- Understanding ARP Attacks -- Understanding MAC Attacks -- Understanding CAM Overflows -- Understanding CDP/LLDP Reconnaissance -- Understanding VLAN Hopping -- Understanding DHCP Spoofing -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Preventing Layer 2 Attacks -- Configuring DHCP Snooping -- Configuring Dynamic ARP Inspection -- Configuring Port Security -- Configuring STP Security Features -- Disabling DTP -- Verifying Mitigations -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 VLAN Security -- Native VLANs -- PVLANs -- ACLs on Switches -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Securing Management Traffic.…”
    Full text (MFA users only)
    Electronic eBook
  11. 491

    Exploratory data analysis with MATLAB by Martinez, Wendy L., Martinez, Angel R., Solka, Jeffrey

    Published 2017
    Table of Contents: “…5.5.2 Probabilistic Latent Semantic Analysis5.6 Minimum Spanning Trees and Clustering; 5.6.1 Definitions; 5.6.2 Minimum Spanning Tree Clustering; 5.7 Evaluating the Clusters; 5.7.1 Rand Index; 5.7.2 Cophenetic Correlation; 5.7.3 Upper Tail Rule; 5.7.4 Silhouette Plot; 5.7.5 Gap Statistic; 5.7.6 Cluster Validity Indices; 5.8 Summary and Further Reading; Exercises; Chapter 6 Model-Based Clustering; 6.1 Overview of Model-Based Clustering; 6.2 Finite Mixtures; 6.2.1 Multivariate Finite Mixtures; 6.2.2 Component Models -- Constraining the Covariances; 6.3 Expectation-Maximization Algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  12. 492

    Contemporary Ergonomics 1998. by Hanson, Margaret A.

    Published 1998
    Table of Contents: “…Development of a questionnaire to measure attitudes towards virtual reality -- Orientation of blind users on the World Wide Web -- F̃lash, splash and crash:̃ Human factors and the implementation of innovative Web technologies -- Determining ergonomic factors in stress from work demands of nurses -- A risk assessment and control cycle approach to managing workplace stress -- Teleworking: Assessing the risks -- Evaluating teleworking -- case study -- Team organisational mental models: an integrative framework for research -- The impact of ITT on virtual team working in the European automotive industry -- The effect of communication processes upon workers and job efficiency -- A case study of job design in a steel plant -- The effects of age and habitual physical activity on the adjustment to nocturnal shiftwork -- Job design for university technicians: work activity and allocation of function -- Allocation of functions and manufacturing job design based on knowledge requirements -- The need to specify cognition within system requirements -- Analysis of complex communication tasks -- Health and safety as the basis for specifying information systems design requirements -- Cognitive algorithms -- Rapid prototyping in foam of 3D anthropometric computer models in functional postures -- The use of high and low level prototyping methods for product user interfaces -- Creative collaboration in engineering design teams -- Pleasure and product semantics -- A survey of usability practice and needs in Europe -- Cultural influence in usability assessment -- Interface display designs based on operator knowledge requirements -- Understanding what makes icons effective: how subjective ratings can inform design -- Representing uncertainty in decision support systems: the state of the art.…”
    Full text (MFA users only)
    Electronic eBook
  13. 493

    Pediatric incontinence : evaluation and clinical management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  14. 494

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Managing the Potentials for Resilient Performance / Erik Hollnagel -- 3.6.1.Organizations of the First Kind / Erik Hollnagel -- 3.6.2.Organizations of the Second Kind / Erik Hollnagel -- 3.6.3.Organizations of the Third Kind / Erik Hollnagel -- 3.6.4.Organizations of the Fourth Kind / Erik Hollnagel -- 3.7. …”
    Full text (MFA users only)
    Electronic eBook
  15. 495
  16. 496

    Quasicrystals : a primer by Janot, C. (Christian), 1936-

    Published 1997
    Table of Contents: “…Cover; Contents; 1 How to fill with atoms in condensed matter states; 1.1 Introduction; 1.2 Periodic structures; 1.2.1 Lattices, cells, bases, and space groups; 1.2.2 Atomic planes, rows, and indices; 1.2.3 The reciprocal lattice; 1.2.4 Experimental determination of crystal structures; 1.2.5 The notion of forbidden symmetries; 1.3 Liquids, glasses, and amorphous alloys; 1.3.1 Description of 'disordered' systems; 1.3.2 Diffraction with disordered systems; 1.4 Quasiperiodicity: another type of long-range order; 1.4.1 A one-dimensional example of non-periodic long-range order.…”
    Full text (MFA users only)
    Electronic eBook
  17. 497

    Discovering knowledge in data : an introduction to data mining by Larose, Daniel T.

    Published 2014
    Table of Contents: “…DISCOVERING KNOWLEDGE IN DATA -- Contents -- Preface -- 1 An Introduction to Data Mining -- 1.1 What is Data Mining? -- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
    Full text (MFA users only)
    Electronic eBook
  18. 498

    Clinical simulation : operations, engineering and management

    Published 2008
    Table of Contents: “…; 3.5 The Systems Approach to Training; 3.6 Defining the Performance Requirement; 3.7 Cost Versus Value Added; 3.8 Operations Cost; 3.9 Standardization: What is it, and who Wants it?; 3.10 Patients as Training Conditions; 3.11 Equipment as Training Conditions; 3.12 Increase in Training System Cost; 3.13 You as the Leader-Manager; 3.14 Conclusion; Endnotes; Topic II What's In It For Me.…”
    Full text (MFA users only)
    Electronic eBook
  19. 499

    Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture

    Published 2019
    Table of Contents: “…The Digitalization of Cultural Policies in France 149; Anne BELLON 14.1.…”
    Full text (MFA users only)
    Electronic eBook
  20. 500

    Legibility in the age of signs and machines

    Published 2018
    Full text (MFA users only)
    Electronic eBook