Search Results - (((((((ant OR canton) OR semantic) OR wind) OR cantor) OR anne) OR plane) OR hints) algorithms.

Refine Results
  1. 481

    Software engineering for embedded systems : methods, practical techniques, and applications

    Published 2013
    Table of Contents: “…-- Summary -- References -- Bibliography -- A bit of history to set the scene -- Auto electronics: 1911-2000 -- Electronic content growth drivers -- The resultant embedded SW growth -- Automotive programming languages -- Summary of implications -- Automotive segments and how they differ -- Body -- Chassis and safety -- Driver assistance -- Powertrain and transmission -- Infotainment and telematics -- Automotive subsegment summary -- Automotive quality -- Planning for Murphy's law -- Fault-tolerant communications -- Fault-tolerant software -- Zero-defect software -- Risk management and failure modes -- Failure modes and effects analysis -- Development and test -- Subsystem interoperability -- Software specifications -- Software architecture -- Modeling -- Autocoding and drivers -- Bench testing -- Trace and debug -- Final-phase testing -- Calibration -- Maintenance/product lifetime support -- Automotive diagnostics -- MIL -- Data logger -- OBD II -- Automotive standards -- MISRA -- AUTOSAR -- AEC -- Automotive safety -- ISO 26262 -- ASIL -- Automotive security -- What it used to mean: car alarms etc -- What it means today: hacking -- What it will mean tomorrow: counterfeiting -- The near future of the automotive market -- Performance -- The emergence of multicore -- The connected vehicle -- The automated vehicle -- Conclusion -- I/O device and I/O controller -- Category of I/O devices -- I/O controller -- Memory-mapped 1/0 and DMA -- Flash, SD/SDHC and disk drive -- Network-attached storage -- I/O programming -- I/O software goals -- I/O software layer -- Case study: device driver in Linux -- Storage programming -- I/O for block devices -- Flash device programming -- SATA device driver -- Performance improvement of storage systems -- Case study 1: performance optimization on SDHC -- Case study 2: performance optimization on NAS -- Summary -- Bibliography -- Introduction -- System architecture of network devices -- Data, control, service and management planes -- Multicore SoCs for networking -- Cores -- Packet engine hardware (PEH) block -- Network programming models -- Pipeline programming model -- Run-to-completion programming -- Structure of packet-processing software -- Data-plane infrastructure (DP-Infra) -- Structure of the forwarding engine -- Packet-processing application requirements -- Network application programming techniques -- Multicore performance techniques for network application programmers.…”
    Full text (MFA users only)
    Electronic eBook
  2. 482
  3. 483

    Understanding smart sensors by Frank, Randy

    Published 2013
    Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
    Full text (MFA users only)
    Electronic eBook
  4. 484

    Power system monitoring and control by Bevrani, Hassan

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  5. 485

    XML for DB2 information integration

    Published 2004
    Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  6. 486
  7. 487
  8. 488

    Sigma-Delta Converters. by De la Rosa, José M.

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  9. 489

    Big data : concepts, technology and architecture by Balusamy, Balamurugan, R, Nandhini Abirami, Kadry, Seifedine, 1977-, Gandomi, Amir Hossein

    Published 2021
    Table of Contents: “…143</p> <p>5.2.3HDFS Architecture. 143</p> <p>5.2.4HDFS Read/Write Operation. 146</p> <p>5.2.5Rack Awareness. 148</p> <p>5.2.6Features of HDFS. 149</p> <p>5.2.6.1Cost-effective. 149</p> <p>5.2.6.2Distributed storage. 149</p> <p>5.2.6.3Data Replication. 149</p> <p>5.3 Hadoop Computation. 149</p> <p>5.3.1MapReduce. 149</p> <p>5.3.1.1Mapper. 151</p> <p>5.3.1.2Combiner. 151</p> <p>5.3.1.3 Reducer. 152</p> <p>5.3.1.4 JobTracker and TaskTracker. 153</p> <p>5.3.2 MapReduce Input Formats. 154</p> <p>5.3.3 MapReduce Example. 156</p> <p>5.3.4 MapReduce Processing. 157</p> <p>5.3.5 MapReduce Algorithm.. 160</p> <p>5.3.6 Limitations of MapReduce. 161</p> <p>5.4Hadoop 2.0. 161</p> <p>5.4.1Hadoop 1.0 limitations. 162</p> <p>5.4.2 Features of Hadoop 2.0. 163</p> <p>5.4.3 Yet Another Resource Negotiator (YARN). 164</p> <p>5.4.3 Core components of YARN.. 165</p> <p>5.4.3.1 ResourceManager. 165</p> <p>5.4.3.2 NodeManager. 166</p> <p>5.4.4 YARN Scheduler. 169</p> <p>5.4.4.1 <i>FIFO scheduler</i>. 169</p> <p>5.4.4.2 <i>Capacity Scheduler</i>. 170</p> <p>5.4.4.3 <i>Fair Scheduler</i>. 170</p> <p>5.4.5 Failures in YARN.. 171</p> <p>5.4.5.1ResourceManager failure. 171</p> <p>5.4.5.2 ApplicationMaster failure. 172</p> <p>5.4.5.3 NodeManagerFailure. 172</p> <p>5.4.5.4 Container Failure. 172</p> <p>5.3 HBASE. 173</p> <p>5.4 Apache Cassandra. 176</p> <p>5.5 SQOOP. 177</p> <p>5.6 Flume. 179</p> <p>5.6.1 Flume Architecture. 179</p> <p>5.6.1.1 Event. 180</p> <p>5.6.1.2 Agent. 180</p> <p>5.7 Apache Avro. 181</p> <p>5.8 Apache Pig. 182</p> <p>5.9 Apache Mahout. 183</p> <p>5.10 Apache Oozie. 183</p> <p>5.10.1 Oozie Workflow.. 184</p> <p>5.10.2 Oozie Coordinators. 186</p> <p>5.10.3 Oozie Bundles. 187</p> <p>5.11 Apache Hive. 187</p> <p>5.11 Apache Hive. 187</p> <p>Hive Architecture. 189</p> <p>Hadoop Distributions. 190</p> <p>Chapter 5refresher. 191</p> <p>Conceptual short questions with answers. 194</p> <p>Frequently asked Interview Questions. 199</p> <p>Chapter Objective. 200</p> <p>6.1 Terminologies of Big Data Analytics. 201</p> <p><i>Data Warehouse</i>. 201</p> <p><i>Business Intelligence</i>. 201</p> <p><i>Analytics</i>. 202</p> <p>6.2 Big Data Analytics. 202</p> <p>6.2.1 Descriptive Analytics. 204</p> <p>6.2.2 Diagnostic Analytics. 205</p> <p>6.2.3 Predictive Analytics. 205</p> <p>6.2.4 Prescriptive Analytics. 205</p> <p>6.3 Data Analytics Lifecycle. 207</p> <p>6.3.1 Business case evaluation and Identify the source data. 208</p> <p>6.3.2 Data preparation. 209</p> <p>6.3.3 Data Extraction and Transformation. 210</p> <p>6.3.4 Data Analysis and visualization. 211</p> <p>6.3.5 Analytics application. 212</p> <p>6.4 Big Data Analytics Techniques. 212</p> <p>6.4.1 Quantitative Analysis. 212</p> <p>6.4.3 Statistical analysis. 214</p> <p>6.4.3.1 A/B testing. 214</p> <p>6.4.3.2 Correlation. 215</p> <p>6.4.3.3 Regression. 218</p> <p>6.5 Semantic Analysis. 220</p> <p>6.5.1 Natural Language Processing. 220</p> <p>6.5.2 Text Analytics. 221</p> <p>6.7 Big Data Business Intelligence. 222</p> <p>6.7.1 Online Transaction Processing (OLTP). 223</p> <p>6.7.2 Online Analytical Processing (OLAP). 223</p> <p>6.7.3 Real-Time Analytics Platform (RTAP). 224</p> <p>6.6Big Data Real Time Analytics Processing. 225</p> <p>6.7 Enterprise Data Warehouse. 227</p> <p>Chapter 6 Refresher. 228</p> <p>Concept…”
    Full text (MFA users only)
    Electronic eBook
  10. 490

    Analyzing neural time series data : theory and practice by Cohen, Mike X., 1979-

    Published 2014
    Table of Contents: “…Rectangular and Polar Notation and the Complex Plane -- 13.4. Euler's Formula -- 13.5. Euler's Formula and the Result of Complex Wavelet Convolution -- 13.6. …”
    Full text (MFA users only)
    Electronic eBook
  11. 491

    Unmanned aircraft systems

    Published 2016
    Table of Contents: “…Unmanned Aircraft Systems -- Contents -- Contributors -- Foreword -- Preface -- Part 1: Introductory -- Chapter 1: UAS Uses, Capabilities, Grand Challenges -- 1 Introduction -- 2 Uses -- Missions and Applications -- 2.1 Early evolution -- 2.2 Dull, dirty, and dangerous -- 2.3 Emergence of civil and commercial applications -- 3 Emerging Capabilities And A Look Ahead -- 3.1 Expanding the design space and operational envelope -- 3.2 Autonomy -- 4 Grand Challenges Ahead -- 4.1 Access to the airspace -- 4.2 The quest for trust -- 4.3 Integration -- 5 Summary -- References -- Part 2: Missions -- Chapter 2: Remote Sensing Methodology for Unmanned Aerial Systems -- 1 Introduction -- 2 UAS Remote Sensing Methodology -- 3 Core Concepts in UAS Remote Sensing Applications -- 3.1 Detection/Counting Applications -- 3.2 Identification/Localization Applications -- 3.3 Analysis Applications -- 4 UAS Imaging Equipment -- 4.1 Video Systems -- 4.2 Digital Cameras -- 4.3 Calibrated Digital Imagers -- 4.3.1 Digital Cameras as Calibrated Imagers -- 4.3.2 Multispectral and Hyperspectral Imagers -- 4.3.3 Spectral Sensitivity -- 5 Conclusion -- References -- Chapter 3: Autonomous Parachute-Based Precision Delivery Systems -- 1 Introduction -- 2 Concept of Operations and Key Requirements -- 3 Pads Family and Steady-State Performance -- 4 Modeling -- 4.1 Governing equations -- 4.2 Apparent mass and inertia -- 4.3 PADS aerodynamics -- 4.4 Effect of the control inputs -- 4.5 Linearized models and stability -- 5 Pads Gnc -- 5.1 Maneuver-based guidance -- 5.2 Accounting for the variable winds -- 5.3 Optimal precision placement guidance -- 6 Other Developments -- 6.1 Glide slope angle control -- 6.2 Reduced cost PADS -- 7 Conclusion -- References -- Chapter 4: Networked Multiple UAS -- 1 Introduction -- 2 Principles of Radio Links -- 3 Air-to-Ground Communications.…”
    Full text (MFA users only)
    Electronic eBook
  12. 492

    Visual Inspection Technology in the Hard Disc Drive Industry. by Muneesawang, Paisarn

    Published 2015
    Table of Contents: “…Introduction / Suchart Yammen / Paisarn Muneesawang -- 1.2. Algorithm for corrosion detection / Suchart Yammen / Paisarn Muneesawang -- 1.2.1. …”
    Full text (MFA users only)
    Electronic eBook
  13. 493
  14. 494
  15. 495

    Facial volumization : an anatomic approach

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  16. 496

    Electric Power System Fundamentals. by Acha Daza, Salvador

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  17. 497