Search Results - ("algorithm" OR "algorithms")

Refine Results
  1. 2921

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Algorithm / Bethany Nowviskie -- Alternate reality gaming / Nicole Labitzke -- Analog versus digital / Jake Buckley -- Animated poetry / Philippe Bootz -- Animation/kineticism / Brian Kim Stefans -- Archive / Katherine Harris -- Artificial intelligence / David Elson -- Artificial life / Simon Penny -- Augmented reality / Jay David Bolter -- Authoring systems / Judy Malloy -- Avatars / Bjarke Liboriussen -- Biopoetry / Eduardo Kac -- Blogs / Ruth Page -- Book to e-text / Kirstyn Leuner -- Cave / John Cayley -- Cell phone novel / Larissa Hjorth -- Characteristics of digital media / David Golumbia -- Chatterbots / Ragnhild Tronstad -- Cheats / Julian Kücklich -- Code / Mark C. …”
    Book
  2. 2922

    PID and predictive control of electrical drives and power supplies using MATLAB/Simulink by Wang, Liuping

    Published 2015
    Table of Contents: “…5.7 Tuning PI Control Systems for Power Converter 147 -- 5.7.1 Overview of the Designs 147 -- 5.7.2 Tuning the Current Controllers 149 -- 5.7.3 Tuning Voltage Controller 150 -- 5.7.4 Experimental Evaluations 154 -- 5.8 Tuning P Plus PI Controllers for Power Converter 157 -- 5.8.1 Design and Sensitivity Functions 157 -- 5.8.2 Experimental Results 158 -- 5.9 Robustness of Power Converter Control System Using PI Current Controllers 159 -- 5.9.1 Variation of Inductance Using PI Current Controllers 160 -- 5.9.2 Variation of Capacitance on Closed-loop Performance 163 -- 5.10 Summary 167 -- 5.10.1 Current Controllers 167 -- 5.10.2 Velocity, Position and Voltage Controllers 168 -- 5.10.3 Choice between P Current Control and PI Current Control 169 -- 5.11 Further Reading 169 -- References 169 -- 6 FCS Predictive Control in d − q Reference Frame 171 -- 6.1 States of IGBT Inverter and the Operational Constraints 172 -- 6.2 FCS Predictive Control of PMSM 175 -- 6.3 MATLAB Tutorial on Real-time Implementation of FCS-MPC 177 -- 6.3.1 Simulation Results 179 -- 6.3.2 Experimental Results of FCS Control 181 -- 6.4 Analysis of FCS-MPC System 182 -- 6.4.1 Optimal Control System 182 -- 6.4.2 Feedback Controller Gain 184 -- 6.4.3 Constrained Optimal Control 185 -- 6.5 Overview of FCS-MPC with Integral Action 187 -- 6.6 Derivation of I-FCS Predictive Control Algorithm 191 -- 6.6.1 Optimal Control without Constraints 191 -- 6.6.2 I-FCS Predictive Controller with Constraints 194 -- 6.6.3 Implementation of I-FCS-MPC Algorithm 196 -- 6.7 MATLAB Tutorial on Implementation of I-FCS Predictive Controller 197 -- 6.7.1 Simulation Results 198 -- 6.8 I-FCS Predictive Control of Induction Motor 201 -- 6.8.1 The Control Algorithm for an Induction Motor 202 -- 6.8.2 Simulation Results 204 -- 6.8.3 Experimental Results 205 -- 6.9 I-FCS Predictive Control of Power Converter 209 -- 6.9.1 I-FCS Predictive Control of a Power Converter 209 -- 6.9.2 Simulation Results 211 -- 6.9.3 Experimental Results 214.…”
    Full text (MFA users only)
    Electronic eBook
  3. 2923

    Advanced battery management technologies for electric vehicles by Xiong, Rui, Shen, Weixiang

    Published 2019
    Table of Contents: “…2.7.2 Case One -- OFFPIM Application2.7.3 Case Two -- ONPIM Application; 2.7.4 Discussions; 2.8 Model Uncertainties; 2.8.1 Battery Aging; 2.8.2 Battery Type; 2.8.3 Battery Temperature; 2.9 Other Battery Models; 2.10 Summary; References; Chapter 3 Battery State of Charge and State of Energy Estimation; 3.1 Background; 3.2 Classification; 3.2.1 Look-Up-Table-Based Method; 3.2.2 Ampere-Hour Integral Method; 3.2.3 Data-Driven Estimation Methods; 3.2.4 Model-Based Estimation Methods; 3.3 Model-Based SOC Estimation Method with Constant Model Parameters; 3.3.1 Discrete-Time Realization Algorithm…”
    Full text (MFA users only)
    Electronic eBook
  4. 2924

    Every planar map is four colorable by Appel, Kenneth I., 1932-2013, Haken, Wolfgang

    Published 1989
    Table of Contents: “…(X) The main algorithm -- (y) An upper bound for the time demand, polynomial in N -- (z) Possible improvements -- Supplement to Part I -- Lemmas on T -dischargings, stated S-2 -- proofs S-3 -- Lemma (I) S-6 -- Table l S-7 -- Proof of Lemma (I), continued S-12 -- Proof of Lemma (S+) S-14 -- Proof of the qTS(V5)-Lemma Introduction S-15 -- Cases (So (B = 0,1 S-18 -- Case (So (B = 2 S-19 -- Case (So (B = 3 S-20 -- Case (So (B = 4 S-31 -- Case (So (B = 5 S-38 -- Proof of the L-Lemma S-44 -- Tables of 3- ..., 7-digit arrangements S-45 -- Proof of the qn(V1)-Lemma Case (Sn (B = 0 S-47 -- Case (Sn (B = 1 S-57 -- Case (Sn (B e"2 S-65 -- Lemmas on L- and T -dischargings stated S-66 -- Table, L2 S-68 -- Proofs S-72 -- Proof of qTL(Vk)-Lemma, k = 8, ..., 11 S-79 -- Proof of qTL(V8)-LemmaCase W e"6 S-79 -- Case W = 5 S-83 -- Case W = 4 S-93 -- Case W = 3 S-105 -- Case W = 0 S-115 -- Proof of the qTL(V9)-Lemma Case W e"6 S-121 -- Case W = 5 S-127 -- Case W = 4 S-142 -- Case W = 3 S-160 -- Case W = 0 S-167 -- Proof of the qTL(V10)-Lemma S-170 -- Case 5,L, T2 S-172 -- Case 5,L, ., L,5 S-173 -- Case (Sp (B e"8 S-174 -- Case v = 7 S-175 -- Case v = 6 or 5 S-177 -- Proof of the qTL(V11)-Lemma S-195 -- Proof of the S-Lemma S-197 -- Supplement to Part II -- ((Sa (B) The immersion reducibility of the configurations of U S-198 -- ((Sb (B) The reducers S-202 -- ((Sd (B) The n-decreased extensions S-218 -- ((Se (B) n- and m-values and major vertices of the configurations of U S-250 -- ((Sf (B)List of configurations in U-U' S-251 -- Corresponding Class Check Lists -- (a), (b) C-1 -- I1-1 ..., 15-35 C-1 -- C-23 -- (1a) ..., (1l) C-32 -- (2a) ..., (2fg) C-37 -- (3a) ..., (3cb) C-88 -- (4a) ..., (4g) C-125 -- CTS#04 ..., CTS#33 C-133 -- (5a) ..., (5s) C-139 -- (6a) ..., (7h) C-146 -- (8a) ..., (8c) C-152 -- (8d) ..., (8x) C-153 -- (9a) ..., (10v) C-165 -- (11a) ..., (11h) C-177 -- (12a) ..., (12g) C-179.…”
    Full text (MFA users only)
    Electronic eBook
  5. 2925

    Timed arrays : wideband and time varying antenna arrays by Haupt, Randy L.

    Published 2015
    Table of Contents: “…6.7 Limiter 121 -- 6.8 Circulator 121 -- 6.9 Correcting Errors through Calibration and Compensation 121 -- References 123 -- 7 Time Delay in a Corporate-Fed Array 126 -- 7.1 Pulse Dispersion 128 -- 7.2 Phased Array Bandwidth 130 -- 7.3 Time Delay Steering Calculations 133 -- 7.4 Time Delay Units 135 -- 7.5 Unit Cell Constraints 138 -- 7.6 Time Delay Bit Distribution at the Subarray Level 141 -- References 147 -- 8 Adaptive Arrays 149 -- 8.1 Signal Correlation Matrix 150 -- 8.2 Optimum Array Weights 152 -- 8.3 Adaptive Weights Without Inverting the Correlation Matrix 154 -- 8.4 Algorithms for Nondigital Beamformers 155 -- 8.4.1 Partial Adaptive Nulling 156 -- 8.4.2 Adaptive Nulling with Weight Constraints 158 -- 8.4.3 Adaptive Nulling with Cancellation Beams 159 -- 8.5 Reconfigurable Arrays 160 -- 8.6 Reconfigurable Elements 165 -- 8.7 Time-Modulated Arrays 167 -- 8.8 Adaptive Thinning 172 -- 8.9 Other Adaptive Array Alternatives 177 -- 8.9.1 Beam Switching 178 -- 8.9.2 Direction Finding 178 -- 8.9.3 Retrodirective Array 181 -- 8.9.4 MIMO 181 -- References 184 -- List of Symbols and Abbreviations 188 -- Index 194.…”
    Full text (MFA users only)
    Electronic eBook
  6. 2926

    Uncommon sense : investment wisdom since the stock market's dawn by Kemp, Michael E.

    Published 2015
    Table of Contents: “…-- NOTES -- 8 ARE COMPUTERS THE ANSWER? -- ALGORITHMS -- HIGH FREQUENCY TRADING -- THOMAS PETERFFY -- THINGS HAVEN'T ALWAYS BEEN SO FAST -- HOW FAST CAN IT GET? …”
    Full text (MFA users only)
    Electronic eBook
  7. 2927
  8. 2928

    CCNA Security Study Guide : Exam 210-260. by McMillan, Troy

    Published 2018
    Table of Contents: “…-- Certification Exam Policies -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Understanding Security Fundamentals -- Goals of Security -- Network Topologies -- Common Network Security Zones -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Understanding Security Threats -- Common Network Attacks -- Social Engineering -- Malware -- Data Loss and Exfiltration -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Understanding Cryptography -- Symmetric and Asymmetric Encryption -- Hashing Algorithms -- Key Exchange -- Public Key Infrastructure -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Securing the Routing Process -- Securing Router Access -- Implementing OSPF Routing Update Authentication -- Securing the Control Plane -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Understanding Layer 2 Attacks -- Understanding STP Attacks -- Understanding ARP Attacks -- Understanding MAC Attacks -- Understanding CAM Overflows -- Understanding CDP/LLDP Reconnaissance -- Understanding VLAN Hopping -- Understanding DHCP Spoofing -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Preventing Layer 2 Attacks -- Configuring DHCP Snooping -- Configuring Dynamic ARP Inspection -- Configuring Port Security -- Configuring STP Security Features -- Disabling DTP -- Verifying Mitigations -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 VLAN Security -- Native VLANs -- PVLANs -- ACLs on Switches -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Securing Management Traffic.…”
    Full text (MFA users only)
    Electronic eBook
  9. 2929

    Artificial intelligence and machine learning for business for non-engineers

    Published 2019
    Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- Editors -- Contributors -- 1 Introduction to Artificial Intelligence and Machine Learning -- References -- 2 The Basic Elements of Artificial Intelligence -- Introduction -- Representation -- Representing a Problem -- Representation of Information -- Storing Knowledge -- Representing Knowledge -- Frames -- Trees -- Objects -- Formulating Problems and Solutions -- Storing Knowledge and Information -- File Structures -- Storage Hardware -- Searching for Knowledge and Actions -- Breadth-First Search -- Depth-First Search -- Informed Search -- Sophisticated Search -- Heuristic Search -- Local Search Algorithms -- Adversarial Search and Games -- Problem-Solving, Decision-Making, and Taking Action -- Reasoning -- Agents Employing Reasoning and Making Decisions -- Resolution, Reaching Reasoned Conclusions, and Taking Appropriate Action -- References -- 3 Artificial Intelligence and the Cloud -- References -- 4 Artificial Intelligence Security Threats -- References -- 5 Artificial Intelligence and IT Management -- General Intro -- Chapter Framework -- Service Operations -- General Overview of Where AI Is Making an Impact Today -- Event Management -- Where AI Is Making an Impact in Event Management Today -- Event Consolidation and Correlation -- Elimination of False Positives -- Thresholds -- Autonomous Action -- Trend Analysis -- Future Outlook for AI in Event Management -- Incident Management -- Where AI Is Making an Impact in Incident Management Today -- Notification -- Collaboration -- Auto-Recovery and Restoration -- Escalation -- Future Outlook for AI in Incident Management -- Request Fulfillment -- Future Outlook for AI in Request Fulfillment -- Problem Management -- Escalation -- Correlation/Root Cause Analysis -- Trending/Patterns.…”
    Full text (MFA users only)
    Electronic eBook
  10. 2930

    The AI book : the artificial intelligence handbook for investors, entrepreneurs and FinTech visionaries

    Published 2020
    Table of Contents: “…AI and the Law: Challenges and Risks for the Financial Services Sector. Algorithm Assurance. Regulation of AI within the Financial Services Sector. …”
    Full text (MFA users only)
    Electronic eBook
  11. 2931

    A practical approach to cardiovascular medicine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  12. 2932

    Heterogeneous networks in LTE-Advanced by Acharya, Joydeep

    Published 2014
    Table of Contents: “…4.6.1 Scheduling Algorithms 4.6.2 Inter-eNodeB Coordination for Resource Allocation in LTE; References; Part II Inter-Cell Interference Coordination; Chapter 5 Release 10 Enhanced ICIC; 5.1 Introduction; 5.2 Typical Deployment Scenarios; 5.2.1 Macro-Pico Deployment Scenario; 5.2.2 Macro-Femto Deployment Scenario; 5.3 Time Domain Techniques; 5.3.1 Almost Blank Subframe; 5.3.2 ABS Use Cases; 5.3.3 UE Measurement and Reporting; 5.3.4 Backhaul Support; 5.3.5 Simulation Results; 5.4 Power Control Techniques; 5.4.1 Target Scenario; 5.4.2 Power Control Schemes.…”
    Full text (MFA users only)
    Electronic eBook
  13. 2933
  14. 2934
  15. 2935

    W.C. McKern and the Midwestern Taxonomic Method by Lyman, R. Lee

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  16. 2936

    Microscopic image analysis for life science applications

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  17. 2937
  18. 2938

    Maternal critical care : a multidisciplinary approach

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  19. 2939
  20. 2940

    Wintrobe's clinical hematology

    Published 2014
    Full text (MFA users only)
    Electronic eBook