Search Results - (((((((want OR wantis) OR canton) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 28
- Artificial intelligence 25
- Machine learning 25
- Data mining 17
- Mathematics 17
- Algorithms 15
- Mathematical models 14
- algorithms 14
- artificial intelligence 14
- Technological innovations 12
- Application software 11
- Computer networks 11
- Development 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Information technology 9
- methods 9
- Social aspects 8
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Mathematical optimization 6
- Parallel processing (Electronic computers) 6
- Wireless communication systems 6
- Bioinformatics 5
Search alternatives:
-
141
Data clustering in C++ : an object-oriented approach
Published 2011Full text (MFA users only)
Electronic eBook -
142
Handbook for pandemic and mass-casualty planning and response
Published 2012Table of Contents: “…Burn Injuries during Mass-Casualty IncidentsBlast Injuries; Section 3: Communication and Information Sharing; Information Sharing in Practice and for Practice: Mass-Casualty Cases; Communication between Emergency Medical Services and Media during Mass-Casualty Events in Croatia; Just-in-Time Information; Collaboration Topologies for Interdisciplinary and Interlevel Information Exchange; Networks and Their Role in Counteracting Contemporary Global Threats: A New Model; Architecture of R & D Project Management Systems at Medical Institutions; Lessons Learned; Lessons Learned; Subject Index…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
143
Parallel computing : technology trends
Published 2020Table of Contents: “…Feedback-Driven Performance and Precision Tuning for Automatic Fixed Point Exploitation -- Parallel Programming -- A GPU-CUDA Framework for Solving a Two-Dimensional Inverse Anomalous Diffusion Problem -- Parallelization Strategies for GPU-Based Ant Colony Optimization Applied to TSP -- DBCSR: A Blocked Sparse Tensor Algebra Library -- Acceleration of Hydro Poro-Elastic Damage Simulation in a Shared-Memory Environment -- BERTHA and PyBERTHA: State of the Art for Full Four-Component Dirac-Kohn-Sham Calculations -- Prediction-Based Partitions Evaluation Algorithm for Resource Allocation…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
144
High performance computing on complex environments
Published 2014Table of Contents: “…Chapter 4: Parallel Algorithms for Parabolic Problems on Graphs in Neuroscience4.1 Introduction; 4.2 Formulation of the Discrete Model; 4.3 Parallel Algorithms; 4.4 Computational Results; 4.5 Conclusions; Acknowledgments; References; Part III: Communication and Storage Considerations in High-Performance Computing; Chapter 5: An Overview of Topology Mapping Algorithms and Techniques in High-Performance Computing; 5.1 Introduction; 5.2 General Overview; 5.3 Formalization of the Problem; 5.4 Algorithmic Strategies for Topology Mapping; 5.5 Mapping Enforcement Techniques; 5.6 Survey of Solutions.…”
Full text (MFA users only)
Electronic eBook -
145
Iterative learning control for multi-agent systems coordination
Published 2017Full text (MFA users only)
Electronic eBook -
146
Communicating process architectures 2002.
Published 2002Table of Contents: “…A Communicating Threads (CT) Case Study: JIWYPrioritised Dynamic Communicating Processes -- Part I; Prioritised Dynamic Communicating Processes -- Part II; Implementing a Distributed Algorithm for Detection of Local Knots and Cycles in Directed Graphs; Author Index.…”
Full text (MFA users only)
Electronic eBook -
147
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
148
Advances in time series forecasting. Volume 2
Published 2017Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
Full text (MFA users only)
Electronic eBook -
149
Stochastic Models in Reliability Engineering.
Published 2020Table of Contents: “…4.3.1 Run and Phrase -- 4.3.2 Multi-State Compression Algorithm -- 4.4 Proposed Multi-State Inference Algorithm -- 4.4.1 Rules for Calculating Intermediate Variables -- 4.4.2 Proposed Multi-State Inference Algorithm -- 4.5 Case Study -- 4.5.1 Case Background -- 4.5.2 Calculation and Analysis -- 4.6 Summary -- Appendix A -- Appendix B -- References -- Chapter 5 Reliability Analysis of Demand-Based Warm Standby System with Multi-State Common Bus -- 5.1 Introduction -- 5.2 Model Description for a DBWSS with Multi-State Common Bus Performance Sharing…”
Full text (MFA users only)
Electronic eBook -
150
PRINCIPLES OF QUANTUM ARTIFICIAL INTELLIGENCE.
Published 2013Table of Contents: “…Computation; 2.1 Entscheidungsproblem; 2.1.1 Cantor's diagonal argument; 2.1.2 Reductio ad absurdum; 2.2 Complexity Theory; 2.2.1 Decision problems; 2.2.2 P and NP; 2.3 Church-Turing Thesis; 2.3.1 Church-Turing-Deutsch principle; 2.4 Computers; 2.4.1 Analog computers; 2.4.2 Digital computers; 2.4.3 Von Neumann architecture; 3. …”
Full text (MFA users only)
Electronic eBook -
151
Creating wicked students : designing courses for a complex world
Published 2018Full text (MFA users only)
Electronic eBook -
152
Cognitive Electronic Warfare : An Artificial Intelligence Approach.
Published 2021Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
Full text (MFA users only)
Electronic eBook -
153
Pulmonary arterial hypertension : diagnosis and evidence-based treatment
Published 2008Table of Contents: “…Combination therapy in pulmonary arterial hypertension / Anne Keogh and Marius Hoeper -- Interventional and surgical modalities of treatment for pulmonary arterial hypertension / Julio Sandoval and Ramona Doyle -- End points and clinical trial design in pulmonary arterial hypertension : clinical and regulatory perspectives / Andrew J. …”
Full text (MFA users only)
Electronic eBook -
154
Machine Learning with Swift : Artificial Intelligence for iOS.
Published 2018Full text (MFA users only)
Electronic eBook -
155
Code : Collaborative Ownership and the Digital Economy.
Full text (MFA users only)
Electronic eBook -
156
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Full text (MFA users only)
Electronic eBook -
157
Mechanisms and games for dynamic spectrum allocation
Published 2013Table of Contents: “…7.3.10 Other equilibrium concepts -- 7.4 Learning equilibria -- 7.4.1 Learning Nash equilibria -- 7.4.2 Learning epsilon-equilibrium -- 7.4.3 Learning coarse correlated equilibrium -- 7.4.4 Learning satisfaction equilibrium -- 7.4.5 Discussion -- 7.5 Conclusion -- References -- II Cognitive radio and sharing of unlicensed spectrum -- 8 Cooperation in cognitiveradio networks: from accessto monitoring -- 8.1 Introduction -- 8.1.1 Cooperation in cognitive radio: mutual benefits and costs -- 8.2 An overview of coalitional game theory -- 8.3 Cooperative spectrum exploration and exploitation -- 8.3.1 Motivation -- 8.3.2 Basic problem -- 8.3.3 Joint sensing and access as a cooperative game -- 8.3.4 Coalition formation algorithm for joint sensing and access -- 8.3.5 Numerical results -- 8.4 Cooperative primary user activity monitoring -- 8.4.1 Motivation -- 8.4.2 Primary user activity monitoring: basic model -- 8.4.3 Cooperative primary user monitoring -- 8.4.4 Numerical results -- 8.5 Summary -- Acknowledgements -- Copyright notice -- References -- 9 Cooperative cognitive radios with diffusion networks -- 9.1 Introduction -- 9.2 Preliminaries -- 9.2.1 Basic tools in convex and matrix analysis -- 9.2.2 Graphs -- 9.3 Distributed spectrum sensing -- 9.4 Iterative consensus-based approaches -- 9.4.1 Average consensus algorithms -- 9.4.2 Acceleration techniques for iterative consensus algorithms -- 9.4.3 Empirical evaluation -- 9.5 Consensus techniques based on CoMAC -- 9.6 Adaptive distributed spectrum sensing based on adaptive subgradient techniques -- 9.6.1 Distributed detection with adaptive filters -- 9.6.2 Set-theoretic adaptive filters for distributed detection -- 9.6.3 Empirical evaluation -- 9.7 Channel probing -- 9.7.1 Introduction -- 9.7.2 Admissibility problem -- 9.7.3 Power and admission control algorithms.…”
Full text (MFA users only)
Electronic eBook -
158
Handbook of power systems. II
Published 2010Table of Contents: “…Cover -- Handbook of Power Systems II13; -- Preface of Volume II13; -- Contents of Volume II13; -- Contents13; of Volume I -- Contributors13; -- Part I Transmission and Distribution Modeling -- Recent Developments in Optimal Power Flow Modeling Techniques -- 1 Introduction -- 2 Physical Network Representation -- 3 Operational Constraints -- 4 Tap-Changing and Regulating Transformers -- 5 FACTS Devices -- 6 OPF Objective Functions and Formulations -- 7 OPF Solution Techniques -- 8 Numerical Examples -- 9 Conclusion -- References -- Algorithms for Finding Optimal Flows in Dynamic Networks -- 1 Optimal Dynamic Network Flow Models and Power Industry -- 2 Minimum Cost Dynamic Single: Commodity Flow Problems and Algorithms for Their Solving -- 3 Minimum Cost Dynamic Multicommodity Flow Problems and Algorithms for Their Solving -- References -- Signal Processing for Improving Power Quality -- 1 Wavelet-based Algorithm for Harmonics Analysis -- 2 Wavelet-based Algorithm for Nonstationary Power System Waveform Analysis -- 3 Wavelet-GA-ANN Based Hybrid Model for Accurate Prediction of Short-term Load Forecast -- 4 Conclusions -- References -- Transmission Valuation Analysis based on Real Options with Price Spikes -- 1 Introduction -- 2 Behavior of Commodity Prices -- 3 Valuation of Obligations and Options -- 4 Valuation in the Presence of Spikes -- 5 Conclusions -- References -- Part II Forecasting in Energy -- Short-term Forecasting in Power Systems: A Guided Tour -- 1 Introduction -- 2 Electricity Load Forecasting -- 3 Wind Power Forecasting -- 4 Forecasting Electricity Prices -- 5 Conclusions -- References -- State-of-the-Art of Electricity Price Forecasting in a Grid Environment -- 1 Introduction -- 2 State-of-the-Art Techniques of Electricity Price Forecasting -- 3 Input8211;Output Specifications of Electricity Price Forecasting Techniques -- 4 Comparing Existing Statistical Techniques for Electricity Price Forecasting -- 5 Implementations of Electricity Price Forecasting in a Grid Environment -- 6 Conclusions -- References -- Modelling the Structure of Long-Term Electricity Forward Prices at Nord Pool -- 1 Introduction -- 2 Long-term Forward Price Process -- 3 Model Estimation -- 4 Conclusions -- References -- Hybrid Bottom-Up/Top-Down Modeling of Prices in Deregulated Wholesale Power Markets -- 1 Introduction -- 2 Top-Down Models for Electricity Price Forecasting -- 3 Hybrid Bottom-Up/Top-Down Modeling -- 4 A Hybrid Model for the New Zealand Electricity Market -- 5 A Hybrid Model for the Australian Electricity Market -- 6 Conclusions -- References -- Part III Energy Auctions and Markets -- Agent-based Modeling and Simulation of Competitive Wholesale Electricity Markets -- 1 Introduction -- 2 Agent-based Modeling and Simulation -- 3 Behavioral Modeling -- 4 Market Modeling -- 5 Conclusions -- References -- Futures Market Trading for Electricity Producers and Retailers -- 1 Introduction: Futures Market Trading -- 2 Producer Trading -- 3 Retailer Trading -- 4 Conclusions -- References -- A Decision Support System for Generation Planning and Operation in Electricity Markets -- 1 Introduction -- 2 Long-term Stochastic Market Planning Model -- 3 Medium-term Stochastic Hydrothermal Coordination Model -- 4 Medium-term Stochastic Simulation Model -- T$29828.…”
Full text (MFA users only)
Electronic eBook -
159
There's Something about Gödel : The Complete Guide to the Incompleteness Theorem.
Published 2009Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
Full text (MFA users only)
eBook -
160
Applications of digital signal processing to audio and acoustics
Published 2002Full text (MFA users only)
Electronic eBook