Search Results - (((((((ant OR wien) OR mantis) OR wind) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 27
- Data processing 24
- Mathematics 24
- Mathematical models 20
- Mathematical optimization 19
- Algorithms 17
- algorithms 17
- Technological innovations 15
- Machine learning 14
- artificial intelligence 14
- Data mining 13
- Information technology 13
- Management 12
- Computer algorithms 11
- Big data 10
- Computer networks 10
- Design and construction 9
- Artificial Intelligence 8
- Mechatronics 8
- Neural networks (Computer science) 8
- Automatic control 7
- Bioinformatics 7
- Computer programming 7
- Electric power systems 7
- Manufacturing processes 7
- Research 7
- Social aspects 7
- Wireless communication systems 7
- Computer science 6
- Data Mining 6
Search alternatives:
- ant »
- mantis »
- cantor »
- wien »
- wind »
-
401
Visual Inspection Technology in the Hard Disc Drive Industry.
Published 2015Table of Contents: “…Introduction / Suchart Yammen / Paisarn Muneesawang -- 1.2. Algorithm for corrosion detection / Suchart Yammen / Paisarn Muneesawang -- 1.2.1. …”
Full text (MFA users only)
Electronic eBook -
402
Fundamentals of Fluid Power Control.
Published 2009Table of Contents: “…Control-Volume Flow Continuity -- PRV Flow -- Force Balance at the Spindle -- 5.13.3 Frequency Response from a Linearized Transfer Function Analysis -- 5.14 Servovalve Dynamics -- First-Stage, Armature, and Flapper-Nozzle -- Flapper-Nozzle and Resistance Bridge Flow Characteristic -- Force Balance at the Spool -- 5.15 An Open-Loop Servovalve-Motor Drive with Line Dynamics Modeled by Lumped Approximations -- Servovalve, Dynamics Included, Underlapped Spool -- Lines, Laminar Mean Flow, Two Lump Approximations per Line, Negligible Motor Internal Volume -- Motor Flow and Torque Equations -- 5.16 Transmission Line Dynamics -- 5.16.1 Introduction -- Servovalve-Cylinder with Short Lines and Significant Actuator Volumes -- Servovalve-Motor with Long Lines and Negligible Actuator Volumes -- 5.16.2 Lossless Line Model for Z and Y -- 5.16.3 Average and Distributed Line Friction Models for Z and Y -- 5.16.4 Frequency-Domain Analysis -- 5.16.5 Servovalve-Reflected Linearized Coefficients -- 5.16.6 Modeling Systems with Nonlossless Transmission Lines, the Modal Analysis Method -- 5.16.7 Modal Analysis Applied to a Servovalve-Motor Open-Loop Drive -- 5.17 The State-Space Method for Linear Systems Modeling -- 5.17.1 Modeling Principles -- 5.17.2 Some Further Aspects of the Time-Domain Solution -- 5.17.3 The Transfer Function Concept in State Space -- 5.18 Data-Based Dynamic Modeling -- 5.18.1 Introduction -- 5.18.2 Time-Series Modeling -- 5.18.3 The Group Method of Data Handling (GMDH) Algorithm -- 5.18.4 Artificial Neural Networks -- 5.18.5 A Comparison of Time-Series, GMDH, and ANN Modeling of a Second-Order Dynamic System -- 5.18.6 Time-Series Modeling of a Position Control System -- 5.18.7 Time-Series Modeling for Fault Diagnosis -- 5.18.8 Time-Series Modeling of a Proportional PRV -- 5.18.9 GMDH Modeling of a Nitrogen-Filled Accumulator.…”
Full text (MFA users only)
Electronic eBook -
403
PID and predictive control of electrical drives and power supplies using MATLAB/Simulink
Published 2015Full text (MFA users only)
Electronic eBook -
404
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
Full text (MFA users only)
Electronic eBook -
405
Systemic architecture : operating manual for the self-organizing city
Published 2012Full text (MFA users only)
Electronic eBook -
406
Dynamics among nations : the evolution of legitimacy and development in modern states
Published 2013Full text (MFA users only)
Electronic eBook -
407
Teaching primary programming with Scratch : research-informed approaches. Teacher book
Published 2022Full text (MFA users only)
Electronic eBook -
408
-
409
Disobedient Aesthetics : Surveillance, Bodies, Control
Published 2024Full text (MFA users only)
Electronic eBook -
410