Mostrando 401 - 420 Resultados de 448 Para Buscar '"fractal"', tiempo de consulta: 0.11s Limitar resultados
  1. 401
    Publicado 2023
    Tabla de Contenidos: “…Author thoughts The Golden Spiral beautifully generalizes Fibonacci numbers -- AI thoughts The fractal geometry of nature -- Puzzle 23 Matching the prime numbers -- Author thoughts Honor the fundamental theorem of arithmetic -- AI thoughts Sense and nonsense -- Puzzle 24 Matching relative prime numbers -- Author thoughts Nothing is either true or false but thinking makes it so -- AI thoughts Six impossible things before breakfast -- 6 Conclusions -- Appendix. …”
    Libro electrónico
  2. 402
    por Hansen, Robert C.
    Publicado 2011
    Tabla de Contenidos: “…PATHOLOGICAL ANTENNAS 147 -- 5.1 Crossed-Field Antenna / 147 -- 5.2 Infinite Efficiency Antenna / 149 -- 5.3 E-H Antenna / 150 -- 5.4 TE-TM Antenna / 150 -- 5.5 Crossed Dipoles / 151 -- 5.6 Snyder Dipole / 152 -- 5.7 Loop-Coupled Loop / 155 -- 5.8 Multiarm Dipole / 158 -- 5.9 Complementary Pair Antenna / 158 -- 5.10 Integrated Antenna / 159 -- 5.11 Q 1/4 0 Antenna / 160 -- 5.12 Antenna in a NIM Shell / 161 -- 5.13 Fractal Antennas / 162 -- 5.14 Antenna on a Chip / 170 -- 5.15 Random Segment Antennas / 171 -- 5.16 Multiple Multipoles / 171 -- 5.17 Switched Loop Antennas / 173 -- 5.18 Electrically Small Focal Spots / 174 -- 5.19 ESA Summary / 174 -- References / 175 -- 6. …”
    Libro electrónico
  3. 403
    por Matthiopoulos, Jason
    Publicado 2011
    Tabla de Contenidos: “…Availability of coastal habitat -- Fractal dimension of the Koch curve -- Further reading -- References -- 3. …”
    Libro electrónico
  4. 404
    Publicado 2015
    Tabla de Contenidos: “…Detection of novelties through adaptive learning and fractal chaos approaches -- 11.9. Neuro computing: new opportunities provided by quantum physics -- 11.10. …”
    Libro electrónico
  5. 405
    Publicado 2022
    Tabla de Contenidos: “…Unconstrained Optimization -- [Advanced Section] Reducing a Constrained Problem to an Unconstrained Optimization Problem -- Absolute and Local Minima of a Function -- Optimization Algorithms -- Line Search and Trust Region -- Steepest Descent -- The Gradient Descent Algorithm -- Choosing the Right Learning Rate -- Variations of GD -- Mini-Batch GD -- Stochastic GD -- How to Choose the Right Mini-Batch Size -- [Advanced Section] SGD and Fractals -- Exercises -- Conclusion -- Chapter 2: Hands-on with a Single Neuron -- A Short Overview of a Neuron's Structure -- A Short Introduction to Matrix Notation -- An Overview of the Most Common Activation Functions -- Identity Function -- Sigmoid Function -- Tanh (Hyperbolic Tangent) Activation Function -- ReLU (Rectified Linear Unit) Activation Function -- Leaky ReLU -- The Swish Activation Function -- Other Activation Functions -- How to Implement a Neuron in Keras -- Python Implementation Tips: Loops and NumPy -- Linear Regression with a Single Neuron -- The Dataset for the Real-World Example -- Dataset Splitting -- Linear Regression Model -- Keras Implementation -- The Model's Learning Phase -- Model's Performance Evaluation on Unseen Data -- Logistic Regression with a Single Neuron -- The Dataset for the Classification Problem -- Dataset Splitting -- The Logistic Regression Model -- Keras Implementation -- The Model's Learning Phase -- The Model's Performance Evaluation…”
    Libro electrónico
  6. 406
    Publicado 2021
    Tabla de Contenidos: “…Nuevos retos de la matemática actual -- La lógica borrosa -- Geometría fractal -- La teoría del caos -- Índice de materias -- Física y química -- Presentación -- Sumario de física y química -- Introducción -- Las fuerzas y sus efectos -- ¿Qué puede provocar una fuerza? …”
    Libro electrónico
  7. 407
    Publicado 2017
    Tabla de Contenidos: “…Phenomenological characteristics -- 6.3.2. Fractal dimension -- 6.3.3. Network robustness -- 6.4. …”
    Libro electrónico
  8. 408
    por Lewis, Ted G.
    Publicado 2023
    Tabla de Contenidos: “…9.2.9 Hacking the DNS -- 9.2.10 Hardware Flaws -- 9.2.11 Botnets -- 9.3 Cyber Risk Analysis -- 9.3.1 Kill Chain Approach -- 9.3.2 Machine-learning Approach -- 9.4 Analysis -- 9.5 Discussion -- References -- Chapter 10 Social Hacking -- 10.1 Web 2.0 and the Social Network -- 10.2 Social Networks Amplify Memes -- 10.3 Topology Matters -- 10.4 Computational Propaganda -- 10.5 Beware the Echo Chamber -- 10.6 Big Data Analytics -- 10.6.1 Algorithmic Bias -- 10.6.2 The Depths of Deep Learning -- 10.6.3 Data Brokers -- 10.7 GDPR -- 10.8 Social Network Resilience -- 10.9 The Sustainable Web -- 10.9.1 The Century of Regulation -- 10.9.2 The NetzDG -- 10.10 Discussion -- References -- Chapter 11 Banking and Finance -- CHAPTER MENU -- 11.1 The Financial System -- 11.1.1 Federal Reserve Versus US Treasury -- 11.1.2 Operating the System -- 11.1.3 Balancing the Balance Sheet -- 11.1.4 Paradox of Enrichment -- 11.2 Financial Networks -- 11.2.1 FedWire -- 11.2.2 TARGET -- 11.2.3 SWIFT -- 11.2.4 Credit Card Networks -- 11.2.5 3-D Secure Payment -- 11.3 Virtual Currency -- 11.3.1 Intermediary PayPal -- 11.3.2 ApplePay -- 11.3.3 Cryptocurrency -- 11.3.3.1 Nakamoto's Revenge -- 11.3.3.2 Double Spend Problem -- 11.3.3.3 Crypto Challenges -- 11.4 Hacking a Financial Network -- 11.5 Hot Money -- 11.5.1 Liquidity Traps -- 11.5.2 The Dutch Disease -- 11.6 The End of Stimulus? -- 11.7 Fractal Markets -- 11.7.1 Efficient Market Hypothesis (EMH) -- 11.7.2 Fractal Market Hypothesis (FMH) -- 11.7.3 Predicting Collapse -- 11.8 The Threat is Existential -- 11.9 Discussion -- References -- Chapter 12 Banking and Finance: Strategies for a Changing World -- 12.1 Whole of Government -- 12.2 Risk and Resilience -- 12.3 Complex and Emergent CIKR -- 12.3.1 Communications and IT -- 12.3.2 Internet and Cybersecurity -- 12.4 Surveillance Capitalism -- 12.5 Industrial Control Systems…”
    Libro electrónico
  9. 409
    Publicado 2022
    Tabla de Contenidos: “…Cyclone eye detection -- 6.3.2. Dynamic fractal field eye tracking -- 6.4. Cyclone field intensity evolution prediction -- 6.5. …”
    Libro electrónico
  10. 410
    Publicado 2022
    Tabla de Contenidos: “…4.7.1 Examples of the Application of Fuzzy Methods in Infrastructure Management -- 4.8 Summary and Conclusion -- 4.9 Questions and Exercises -- Further Reading -- Chapter 5 Automatic Detection and Its Applications in Infrastructure -- 5.1 Introduction -- 5.1.1 Photometric Hypotheses (PH) -- 5.1.2 Geometric and Photometric Hypotheses (GPH) -- 5.1.3 Geometric Hypotheses (GH) -- 5.1.4 Transform Hypotheses (TH) -- 5.2 The Framework for Automatic Detection of Abnormalities in Infrastructure Images -- 5.2.1 Wavelet Method -- 5.2.2 High Amplitude Wavelet Coefficient Percentage (HAWCP) -- 5.2.3 High-Frequency Wavelet Energy Percentage (HFWEP) -- 5.2.4 Wavelet Standard Deviation (WSTD) -- 5.2.5 Moments of Wavelet -- 5.2.6 High Amplitude Shearlet Coefficient Percentage (HASHCP) -- 5.2.7 High-Frequency Shearlet Energy Percentage (HFSHEP) -- 5.2.8 Fractal Index -- 5.2.9 Moments of Complex Shearlet -- 5.2.10 Central Moments q -- 5.2.11 Hu Moments -- 5.2.12 Bamieh Moments -- 5.2.13 Zernike Moments -- 5.2.14 Statistic of Complex Shearlet -- 5.2.15 Contrast of Complex Shearlet -- 5.2.16 Correlation of Complex Shearlet -- 5.2.17 Uniformity of Complex Shearlet -- 5.2.18 Homogeneity of Complex Shearlet -- 5.2.19 Entropy of Complex Shearlet -- 5.2.20 Local Standard Deviation of Complex Shearlet Index (F_Local_STD) -- 5.3 Summary and Conclusion -- 5.4 Questions and Exercises -- Further Reading -- Chapter 6 Feature Extraction and Fragmentation Methods -- 6.1 Introduction -- 6.2 Low-Level Feature Extraction Methods -- 6.3 Shape-Based Feature (SBF) -- 6.3.1 Center of Gravity (COG) or Center of Area (COA) -- 6.3.2 Axis of Least Inertia (ALI) -- 6.3.3 Average Bending Energy -- 6.3.4 Eccentricity Index (ECI) -- 6.3.5 Circularity Ratio (CIR) -- 6.3.6 Ellipse Variance Feature (EVF) -- 6.3.7 Rectangularity Feature (REF) -- 6.3.8 Convexity Feature (COF)…”
    Libro electrónico
  11. 411
    Publicado 2021
    Tabla de Contenidos: “…Glad, Mad, Sad in Japan -- Fun/Done/Learn: An Alternative for Sprint Retrospective Events19 -- How Building a Strong Product Community Put Astah on the Map23 -- Agile Community Event and Meetup -- Chapter 9: The Philippines -- History -- Asia Pacific College: Bridging the Gap Between Academia and Industry Through Information Technology -- Insights -- Getting On and Around -- Agile Community Events and Meetups -- Chapter 10: Singapore -- History -- Insights -- Eight DON'Ts in Agile Transformation -- PALO IT - Valuing Creativity, Positivism, Team Spirit, and the Capacity to Deliver -- Agile and Consciousness in Organizations -- Midlife Crisis -- The Consciousness Lens -- Agile: The Magic Recipe -- The Role of Leaders -- Fractality and the Role of Leaders -- Beyond Agile: The Dawn of Conscious Leaders -- Goals for Sustainable Development -- The Triple Bottom Line -- Conscious Leadership -- Where to Start? …”
    Libro electrónico
  12. 412
    Publicado 2017
    Tabla de Contenidos: “…6.2.2 Indirect particle heating receivers -- 6.2.2.1 Gravity-driven particle flow-through enclosures -- 6.2.2.2 Fluidized particle flow-through tubes -- 6.2.3 Summary of particle receiver technologies -- 6.3 Other high-performance receiver designs -- 6.3.1 Light-trapping receiver designs -- 6.3.1.1 Surface features -- 6.3.1.2 Spiky receiver -- 6.3.1.3 Bladed geometries -- 6.3.1.4 Fractal-like geometries -- 6.3.2 Air curtains -- 6.4 Summary and conclusions -- Acknowledgments -- References -- 7 - Next generation of liquid metal and other high-performance receiver designs for concentrating solar thermal (CST) central tower -- 7.1 Introduction -- 7.2 Thermophysical properties of liquid metals -- 7.3 Liquid metals in central receiver systems -- 7.3.1 Experience in central receiver systems -- 7.3.2 The CRS-SSPS project of the International Energy Agency -- 7.3.3 Other projects with liquid metals in solar receivers -- 7.4 Innovative power conversion cycles with liquid metals as heat transfer fluid -- 7.5 Conclusions and outlook -- References -- 4 - Advances in the power block and thermal storage systems -- 8 - Supercritical CO2 and other advanced power cycles for concentrating solar thermal (CST) systems -- 8.1 Introduction -- 8.2 Stand-alone cycles -- 8.2.1 Steam Rankine cycles -- 8.2.2 Gas Brayton cycles -- 8.2.2.1 Air Brayton cycle -- 8.2.2.2 Helium Brayton cycle -- 8.2.2.3 Supercritical carbon dioxide Brayton cycles -- Simple cycle -- Recompression cycle -- Partial cooling cycle -- 8.2.3 Comparison of the presented cycles -- 8.3 Combined cycles -- 8.3.1 Organic Rankine cycle -- 8.3.2 Supercritical organic Rankine cycle -- 8.3.3 Absorption power cycles -- 8.3.3.1 Kalina cycle -- 8.3.3.2 Goswami cycle -- 8.4 Summary and conclusions -- References -- 9 - Advances in dry cooling for concentrating solar thermal (CST) power plants -- 9.1 Introduction…”
    Libro electrónico
  13. 413
    Publicado 2015
    Tabla de Contenidos: “…5.22.1 A Simple Master-Worker Setup -- 5.22.2 A Multithreaded Master-Worker Setup -- Exercises -- Chapter 6: GPU programming -- 6.1 GPU Programming -- 6.2 CUDA's programming model: threads, blocks, and grids -- 6.3 CUDA's execution model: streaming multiprocessors and warps -- 6.4 CUDA compilation process -- 6.5 Putting together a CUDA project -- 6.6 Memory hierarchy -- 6.6.1 Local Memory/Registers -- 6.6.2 Shared Memory -- 6.6.3 Constant Memory -- 6.6.4 Texture and Surface Memory -- 6.7 Optimization techniques -- 6.7.1 Block and Grid Design -- 6.7.2 Kernel Structure -- 6.7.3 Shared Memory Access -- 6.7.4 Global Memory Access -- 6.7.5 Page-Locked and Zero-Copy Memory -- 6.7.6 Unified Memory -- 6.7.7 Asynchronous Execution and Streams -- 6.7.7.1 Stream Synchronization: Events and Callbacks -- 6.8 Dynamic parallelism -- 6.9 Debugging CUDA programs -- 6.10 Profiling CUDA programs -- 6.11 CUDA and MPI -- 6.12 Case studies -- 6.12.1 Fractal Set Calculation -- 6.12.1.1 Version #1: One thread per pixel -- 6.12.1.2 Version #2: Pinned host and pitched device memory -- 6.12.1.3 Version #3: Multiple pixels per thread -- 6.12.1.4 Evaluation -- 6.12.2 Block Cipher Encryption -- 6.12.2.1 Version #1: The case of a standalone GPU machine -- 6.12.2.2 Version #2: Overlapping GPU communication and computation -- 6.12.2.3 Version #3: Using a cluster of GPU machines -- 6.12.2.4 Evaluation -- Exercises -- Chapter 7: The Thrust template library -- 7.1 Introduction -- 7.2 First steps in Thrust -- 7.3 Working with Thrust datatypes -- 7.4 Thrust algorithms -- 7.4.1 Transformations -- 7.4.2 Sorting and searching -- 7.4.3 Reductions -- 7.4.4 Scans/prefix sums -- 7.4.5 Data management and manipulation -- 7.5 Fancy iterators -- 7.6 Switching device back ends -- 7.7 Case studies -- 7.7.1 Monte carlo integration -- 7.7.2 DNA Sequence alignment -- Exercises…”
    Libro electrónico
  14. 414
    Publicado 2023
    Tabla de Contenidos: “…Focus, spectral density, fractals -- 3.3.3. Textures -- 3.4. Color -- 3.4.1. …”
    Libro electrónico
  15. 415
    Publicado 2017
    Tabla de Contenidos: “…The curse of dimensionality, the data science plague -- Optimizing KMeans -- Story mutation -- The Equilibrium state -- Tracking stories over time -- Building a streaming application -- Streaming KMeans -- Visualization -- Building story connections -- Summary -- Chapter 11: Anomaly Detection on Sentiment Analysis -- Following the US elections on Twitter -- Acquiring data in stream -- Acquiring data in batch -- The search API -- Rate limit -- Analysing sentiment -- Massaging Twitter data -- Using the Stanford NLP -- Building the Pipeline -- Using Timely as a time series database -- Storing data -- Using Grafana to visualize sentiment -- Number of processed tweets -- Give me my Twitter account back -- Identifying the swing states -- Twitter and the Godwin point -- Learning context -- Visualizing our model -- Word2Graph and Godwin point -- Building a Word2Graph -- Random walks -- A Small Step into sarcasm detection -- Building features -- #LoveTrumpsHates -- Scoring Emojis -- Training a KMeans model -- Detecting anomalies -- Summary -- Chapter 12: TrendCalculus -- Studying trends -- The TrendCalculus algorithm -- Trend windows -- Simple trend -- User Defined Aggregate Functions -- Simple trend calculation -- Reversal rule -- Introducing the FHLS bar structure -- Visualize the data -- FHLS with reversals -- Edge cases -- Zero values -- Completing the gaps -- Stackable processing -- Practical applications -- Algorithm characteristics -- Advantages -- Disadvantages -- Possible use cases -- [Chart annotation] -- Chart annotation -- Co-trending -- Data reduction -- Indexing -- Fractal dimension -- Streaming proxy for piecewise linear regression -- Summary -- Chapter 13: Secure Data -- Data security -- The problem -- The basics -- Authentication and authorization -- Access control lists (ACL) -- Role-based access control (RBAC) -- Access -- Encryption…”
    Libro electrónico
  16. 416
    Publicado 2017
    Tabla de Contenidos: “…1.3.2.1 Run-Length Encoding -- 1.3.2.2 Differential Pulse-Code Modulation and Predictive Coding -- 1.3.2.3 Entropy Encoding -- 1.3.2.4 Adaptive Dictionary Algorithms -- 1.3.2.5 Deflation -- 1.3.3 LOSSY IMAGE CODING TECHNIQUES -- 1.3.3.1 Color Space Reduction -- 1.3.3.2 Chroma Subsampling -- 1.3.3.3 Transform Coding -- 1.3.3.4 Fractal Compression -- 1.3.4 VECTOR QUANTIZATION -- 1.3.5 BLOCK TRUNCATION CODING -- 1.3.6 JPEG -- 1.3.7 JPEG2000 -- 1.3.7.1 Color Component Transformation -- 1.3.7.2 Tiling -- 1.3.7.3 Wavelet Transform -- 1.3.7.4 Quantization -- 1.3.7.5 Coding -- 1.4 OVERVIEW OF INFORMATION HIDING TECHNIQUES FOR IMAGES -- 1.4.1 ROBUST IMAGE WATERMARKING -- 1.4.1.1 Background -- 1.4.1.2 Definitions -- 1.4.1.3 Image Watermarking System -- 1.4.1.4 Characteristics -- 1.4.1.5 Overview of Techniques -- 1.4.2 FRAGILE IMAGE WATERMARKING -- 1.4.2.1 Background -- 1.4.2.2 Classification -- 1.4.2.3 Requirements -- 1.4.2.4 Watermarking-Based Authentication System -- 1.4.2.4.1 Authentication Watermark Embedding -- 1.4.2.4.2 Authentication Watermark Extraction and Verification -- 1.4.2.5 Overview of Techniques -- 1.4.3 IMAGE FINGERPRINTING -- 1.4.3.1 Background and Basic Concept -- 1.4.3.2 Differences Between Watermarking and Fingerprinting -- 1.4.3.3 Requirements -- 1.4.3.4 Overview of Techniques -- 1.4.4 IMAGE STEGANOGRAPHY -- 1.4.4.1 Background and Basic Concept -- 1.4.4.2 Image Steganography System -- 1.4.4.3 Overview of Techniques -- 1.4.5 LOSSLESS INFORMATION HIDING IN IMAGES -- 1.4.5.1 Background and Basic Concepts -- 1.4.5.2 Classifications of Schemes -- 1.4.5.3 Overview of Techniques -- 1.4.5.4 Performance Evaluation Criteria for Lossless Data Hiding Schemes -- 1.5 APPLICATIONS OF LOSSLESS INFORMATION HIDING IN IMAGES -- 1.5.1 LOSSLESS HIDING AUTHENTICATION -- 1.5.2 FIDELITY CONTROL FOR COVER MEDIA -- 1.5.3 STATUS RECOVERY FOR COVER MEDIA…”
    Libro electrónico
  17. 417
    Publicado 2018
    Tabla de Contenidos: “…-- 17.2 INTERNAL RATE OF RETURN AS AN INVESTMENT CRITERION -- 17.3 THE LIMITS OF THE INTERNAL RATE OF RETURN -- 17.4 SOME MORE FINANCIAL MATHEMATICS: INTEREST RATE AND YIELD TO MATURITY -- Part Two The risk of securities and the required rate of return -- 18 RISK AND RETURN -- 18.1 SOURCES OF RISK -- 18.2 RISK AND FLUCTUATION IN THE VALUE OF A SECURITY -- 18.3 TOOLS FOR MEASURING RETURN AND RISK -- 18.4 MARKET AND SPECIFIC RISK -- 18.5 THE BETA COEFFICIENT -- 18.6 PORTFOLIO RISK -- 18.7 CHOOSING AMONG SEVERAL RISKY ASSETS AND THE EFFICIENT FRONTIER -- 18.8 CHOOSING BETWEEN SEVERAL RISKY ASSETS AND A RISK-FREE ASSET: THE CAPITAL MARKET LINE -- 18.9 How PORTFOLIO MANAGEMENT WORKS -- 19 THE REQUIRED RATE OF RETURN -- 19.1 RETURN REQUIRED BY INVESTORS: THE CAPM -- 19.2 PROPERTIES OF THE CAPM -- 19.3 LIMITS OF THE CAPM -- 19.4 MULTIFACTOR MODELS -- 19.5 FRACTALS AND OTHER LEADS -- 19.6 TERM STRUCTURE OF INTEREST RATES -- Part Three Financial securities -- 20 BONDS -- 20.1 BASIC CONCEPTS -- 20.2 THE YIELD TO MATURITY -- 20.3 FLOATING-RATE BONDS -- 20.4 SOCIALLY RESPONSIBLE BONDS -- 20.5 THE VOLATILITY OF DEBT SECURITIES -- 20.6 DEFAULT RISK AND THE ROLE OF RATING -- 20.6 DEFAULT RISK AND THE ROLE OF RATING -- 21 OTHER DEBT PRODUCTS…”
    Libro electrónico
  18. 418
    Publicado 2011
    “…L'entreprise contaminée par la finance gaussienne La finance fractale L'entreprise fractale Notre avenir : "économie zombie" ou croissance durable ? …”
    Libro electrónico
  19. 419
    por Tschacher, Wolfgang
    Publicado 1996
    Libro
  20. 420
    Publicado 2021
    “…Índice: Los capítulos del libro, recogidos en sus 222 páginas, son los siguientes:1: Me gustan las Matemáticas.2: Simetrías y Matemáticas.3: Simetrías y Naturaleza.4: Sucesión de Fibonacci y Naturaleza.5: Fractales: Matemáticas de la complejidad.6: Patrones de la Naturaleza…”
    Libro