Search Results - (((((((want OR wantsi) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 59
- Artificial intelligence 55
- Mathematics 41
- Machine learning 37
- Mathematical models 36
- Data mining 29
- artificial intelligence 28
- Algorithms 25
- Artificial Intelligence 21
- Technological innovations 21
- algorithms 21
- Social aspects 20
- Computer networks 18
- Python (Computer program language) 18
- Mathematical optimization 17
- methods 17
- Data Mining 16
- History 16
- Big data 15
- Application software 14
- Computer algorithms 14
- Computer science 14
- Development 14
- Image processing 13
- Statistical methods 13
- Digital techniques 12
- Information technology 12
- Neural networks (Computer science) 12
- Research 12
- Engineering 11
Search alternatives:
-
681
Analytics stories : using data to make good things happen
Published 2021Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
Full text (MFA users only)
Electronic eBook -
682
Millimeter-wave digitally intensive frequency generation in CMOS
Published 2015Full text (MFA users only)
Electronic eBook -
683
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
684
The next economic disaster : why it's coming and how to avoid it
Published 2014Full text (MFA users only)
Electronic eBook -
685
Vehicle Dynamics.
Published 2015Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
Full text (MFA users only)
Electronic eBook -
686
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
687
Handbook of convex optimization methods in imaging science
Published 2017Full text (MFA users only)
Electronic eBook -
688
Cybersecurity Law, standards and regulations
Published 2020Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
Full text (MFA users only)
Electronic eBook -
689
-
690
Essentials of Monte Carlo Simulation : Statistical Methods for Building Simulation Models.
Published 2012Full text (MFA users only)
Electronic eBook -
691
Listed Volatility and Variance Derivatives : a Python-based Guide.
Published 2016Full text (MFA users only)
Electronic eBook -
692
Data Analysis and Applications 1 : New and Classical Approaches.
Published 2019Table of Contents: “…Similarity to homogeneous distributional shapes1.3.11. Stability; 1.3.12. Further Aspects; 1.4. …”
Full text (MFA users only)
Electronic eBook -
693
Advanced mathematical & computational tools in metrology & testing VIII
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
694
The structure of amorphous materials using molecular dynamics
Published 2023Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
Full text (MFA users only)
Electronic eBook -
695
Language processing and grammars : the role of functionally oriented computational models
Published 2014Full text (MFA users only)
Electronic eBook -
696
The method of the generalised eikonal : new approaches in the Diffraction Theory.
Published 2015Full text (MFA users only)
Electronic eBook -
697
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
Full text (MFA users only)
Electronic eBook -
698
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Full text (MFA users only)
Electronic eBook -
699
Power system wide-area stability analysis and control
Published 2018Full text (MFA users only)
Electronic eBook -
700
The internet of things and big data analytics integrated platforms and industry use cases
Published 2020Full text (MFA users only)
Electronic eBook