Search Results - (((((((want OR wanting) OR mantis) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

Search alternatives:

  1. 281
  2. 282
  3. 283

    Handbook of power systems. II

    Published 2010
    Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
    Full text (MFA users only)
    Electronic eBook
  4. 284

    New autonomous systems by Cardon, Alain, 1946-, Itmi, Mhamed

    Published 2016
    Table of Contents: “…Intro -- Table of Contents -- Title -- Copyright -- Introduction -- List of Algorithms -- 1 Systems and their Design -- 1.1. Modeling systems -- 1.2. …”
    Full text (MFA users only)
    Electronic eBook
  5. 285
  6. 286
  7. 287

    There's Something about Gödel : The Complete Guide to the Incompleteness Theorem. by Berto, Francesco

    Published 2009
    Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
    Full text (MFA users only)
    eBook
  8. 288

    Heating by Electromagnetic Sources (HES 2016). by Jan Sykulski, Fabrizio Dughiero

    Published 2017
    Table of Contents: “…Influence of SEN depth and port angle on vertical electromagnetic brake effects in continuous casting mouldInduction heating in estimation of thermal properties of conductive materials; Nonlinear model order reduction for the fast solution of induction heating problems in time-domain; Improved Litz wire manufacture process using resonant power converter-based induction heating; Design of power converters for induction heating applications taking advantage of wide-bandgap semiconductors; Construction improvement of the thermoelastic clutch based on shape optimization…”
    Full text (MFA users only)
    Electronic eBook
  9. 289
  10. 290

    Cognitive Electronic Warfare : An Artificial Intelligence Approach. by Haigh, Karen

    Published 2021
    Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    Apache Spark for Data Science Cookbook. by Chitturi, Padma Priya

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  12. 292
  13. 293

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  14. 294

    What Every Teacher Should Know About Effective Teaching Strategies. by Tileston, Donna E. Walker

    Published 1900
    Table of Contents: “…Procedural MemoryAutomatic Memory -- Emotional Memory -- Chapter 4 -- Procedural Knowledge: Teaching Strategies That Work -- Helping Students Construct Models -- Teaching Procedural Knowledge That Requires Algorithms -- Strategies to Help Construct Models -- Shaping Procedural Knowledge -- Internalizing Procedural Knowledge -- The Metacognitive System -- Chapter 5 -- Graphic Organizers: Strategies for Thinking -- Graphic Organizers -- Chapter 6 -- Using Verbal Strategies in the Classroom -- Brainstorming -- Socratic Questioning -- Quaker Dialogues…”
    Full text (MFA users only)
    Electronic eBook
  15. 295

    Features and processing in agreement by Mancini, Simona, 1978-

    Published 2018
    Table of Contents: “…1st/2nd vs. 3rd person: Person underspecification and context-dependencePronoun representation and interpretive anchors; The featural makeup of pronouns; Summary; Chapter Five; When disagreement is grammatical: Unagreement; Unagreement processing and the role of interpretive anchors; Unagreeing, null and overt subjects; Summary; Chapter Six; From feature bundles to feature an; Representations, algorithms and neuroanatomical bases of agreement; Relation to existing sentence comprehension models; Conclusion; Notes; Bibliography; Index…”
    Full text (MFA users only)
    Electronic eBook
  16. 296

    Reservoir engineering in modern oilfields : vertical, deviated, horizontal, and multilateral well systems by Chin, Wilson C.

    Published 2016
    Table of Contents: “…Stratigraphic grids, drilling dome-shaped structures.…”
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Regression Analysis : Theory, Methods, and Applications by Sen, Ashish

    Published 1990
    Table of Contents: “…Random Variables -- B.1.2 Correlated Random Variables -- B.1.3 Sample Statistics -- B.1.4 Linear Combinations of Random Variables -- B.2 Random Vectors -- B.3 The Multivariate Normal Distribution -- B.4 The Chi-Square Distributions -- B.5 The F and t Distributions -- B.6 Jacobian of Transformations -- B.7 Multiple Correlation -- Problems -- C Nonlinear Least Squares -- C.1 Gauss-Newton Type Algorithms -- C.1.1 The Gauss-Newton Procedure -- C.1.2 Step Halving -- C.1.3 Starting Values and Derivatives -- C.1.4 Marquardt Procedure -- C.2 Some Other Algorithms -- C.2.1 Steepest Descent Method -- C.2.2 Quasi-Newton Algorithms -- C.2.3 The Simplex Method -- C.2.4 Weighting -- C.3 Pitfalls -- C.4 Bias, Confidence Regions and Measures of Fit -- C.5 Examples -- Problems -- Tables -- References -- Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  18. 298

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  19. 299

    Curves and Surfaces for CAGD : a Practical Guide. by Farin, Gerald

    Published 2001
    Table of Contents: “…Coons Patches; Chapter 23. Shape; Chapter 24. Evaluation of Some Methods; App.…”
    Full text (MFA users only)
    Electronic eBook
  20. 300

    Hands-On Automated Machine Learning : a beginner's guide to building automated machine learning systems using AutoML and Python. by Das, Sibanjan

    Published 2018
    Table of Contents: “…; Why use AutoML and how does it help?; When do you automate ML?; What will you learn?; Core components of AutoML systems; Automated feature preprocessing; Automated algorithm selection; Hyperparameter optimization; Building prototype subsystems for each component; Putting it all together as an end-to-end AutoML system; Overview of AutoML libraries; Featuretools; Auto-sklearn; MLBox; TPOT; Summary.…”
    Full text (MFA users only)
    Electronic eBook