Search Results - (((((((ant OR wikant) OR mantis) OR went) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 341

    Linear drives for industry applications IX : selected, peer reviewed papers from the 9th International Conference on Linear Drives for Industry Applications (LDIA 2013), July 7-10,...

    Published 2013
    Table of Contents: “…Intro -- Linear Drives for Industry Applications IX -- Preface, Committees and Reviewers -- Table of Contents -- Chapter 1: Linear Motors and Other Electrical Machines -- Design and Analysis of a New Linear Fault-Tolerant Flux-Reversal Permanent-Magnet Machine -- Design of Dual-Rotor Radial Flux Permanent-Magnet Generator for Wind Power Applications -- Inductance and Flux Linkage Variation on Operation Performance for Multi-Segmented Linear PM Motor -- An Optimal Method for Minimizing Cogging Torque in Disc-Type Permanent Magnet Machines Using FEM and Genetic Algorithm -- Research on the End Effect Detent Force Reduction of Permanent Magnet Linear Synchronous Motor with Auxiliary Poles One-Piece Structure -- Performance Analysis of a Linear Motor with HTS Bulk Magnets for Driving a Prototype HTS Maglev Vehicle -- Design of a New Frog-Leg Winding Permanent-Magnet Brushless DC Motor -- Magnetic Shielding for Coreless Linear Permanent Magnet Motors -- Design and Experiment Analysis of Induction Machine Used in the Economical EV -- An Exact Analytical Solution of Halbach Arrays Permanent-Magnet Motor for Magnetic Field on Load -- Analysis, Design and Prototyping of a Low-Speed High-Torque Six-Phase Fault-Tolerant Permanent Magnet Synchronous Machine for EVs -- Investigation of a Single-Phase Oscillating PM Alternator for Free-Piston Stirling Engines -- Punching Machine Driver Research Based on Pulse Electromagnetic Force Actuator -- Characteristic Analysis of Moving Magnet Type Double-Sided Linear Synchronous Motor -- Gravity Neighborhood Estimation Algorithm Based for Cylinder Linear Motor Parameter Optimization -- Copper Losses and Rotor Losses Calculation for the BLDCM Used in a Flywheel Energy Storage System -- Optimal Design of a Double-Sided Permanent Magnet Linear Synchronous Motor for Ropeless Elevator System.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  2. 342
  3. 343

    Cognitive radio communication and networking : principles and practice by Qiu, Robert C., 1966-

    Published 2012
    Table of Contents: “…10.3.3 Game Formulation 369 -- 10.3.4 Bayesian Equilibrium 370 -- 10.3.5 Numerical Results 371 -- 10.4 Games in Collaborative Spectrum Sensing 372 -- 10.4.1 False Report Attack 373 -- 10.4.2 Game Formulation 373 -- 10.4.3 Elements of Game 374 -- 10.4.4 Bayesian Equilibrium 376 -- 10.4.5 Numerical Results 379 -- 11 Cognitive Radio Network 381 -- 11.1 Basic Concepts of Networks 381 -- 11.1.1 Network Architecture 381 -- 11.1.2 Network Layers 382 -- 11.1.3 Cross-Layer Design 384 -- 11.1.4 Main Challenges in Cognitive Radio Networks 384 -- 11.1.5 Complex Networks 385 -- 11.2 Channel Allocation in MAC Layer 386 -- 11.2.1 Problem Formulation 386 -- 11.2.2 Scheduling Algorithm 387 -- 11.2.3 Solution 389 -- 11.2.4 Discussion 390 -- 11.3 Scheduling in MAC Layer 391 -- 11.3.1 Network Model 391 -- 11.3.2 Goal of Scheduling 393 -- 11.3.3 Scheduling Algorithm 393 -- 11.3.4 Performance of the CNC Algorithm 395 -- 11.3.5 Distributed Scheduling Algorithm 396 -- 11.4 Routing in Network Layer 396 -- 11.4.1 Challenges of Routing in Cognitive Radio 397 -- 11.4.2 Stationary Routing 398 -- 11.4.3 Dynamic Routing 402 -- 11.5 Congestion Control in Transport Layer 404 -- 11.5.1 Congestion Control in Internet 404 -- 11.5.2 Challenges in Cognitive Radio 405 -- 11.5.3 TP-CRAHN 406 -- 11.5.4 Early Start Scheme 408 -- 11.6 Complex Networks in Cognitive Radio 417 -- 11.6.1 Brief Introduction to Complex Networks 418 -- 11.6.2 Connectivity of Cognitive Radio Networks 421 -- 11.6.3 Behavior Propagation in Cognitive Radio Networks 423 -- 12 Cognitive Radio Network as Sensors 427 -- 12.1 Intrusion Detection by Machine Learning 429 -- 12.2 Joint Spectrum Sensing and Localization 429 -- 12.3 Distributed Aspect Synthetic Aperture Radar 429 -- 12.4 Wireless Tomography 433 -- 12.5 Mobile Crowdsensing 434 -- 12.6 Integration of 3S 435 -- 12.7 The Cyber-Physical System 435 -- 12.8 Computing 436 -- 12.8.1 Graphics Processor Unit 437 -- 12.8.2 Task Distribution and Load Balancing 437 -- 12.9 Security and Privacy 438.…”
    Full text (MFA users only)
    Electronic eBook
  4. 344
  5. 345

    Designing and Researching of Machines and Technologies for Modern Manufacture.

    Published 2015
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 346

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  7. 347

    Decision Intelligence for Dummies by Baker, Pamela

    Published 2022
    Table of Contents: “…Preventing Wrong Influences from Affecting Decisions -- Bad influences in AI and analytics -- The blame game -- Ugly politics and happy influencers -- Risk Factors in Decision Intelligence -- DI and Hyperautomation -- Part 5 The Part of Tens -- Chapter 17 Ten Steps to Setting Up a Smart Decision -- Check Your Data Source -- Track Your Data Lineage -- Know Your Tools -- Use Automated Visualizations -- Impact = Decision -- Do Reality Checks -- Limit Your Assumptions -- Think Like a Science Teacher -- Solve for Missing Data -- Partial versus incomplete data -- Clues and missing answers -- Take Two Perspectives and Call Me in the Morning -- Chapter 18 Bias In, Bias Out (and Other Pitfalls) -- A Pitfalls Overview -- Relying on Racist Algorithms -- Following a Flawed Model for Repeat Offenders -- Using A Sexist Hiring Algorithm -- Redlining Loans -- Leaning on Irrelevant Information -- Falling Victim to Framing Foibles -- Being Overconfident -- Lulled by Percentages -- Dismissing with Prejudice -- Index -- EULA.…”
    Full text (MFA users only)
    Electronic eBook
  8. 348

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
    Full text (MFA users only)
    Electronic eBook
  9. 349

    Nonlinear science and complexity

    Published 2007
    Table of Contents: “…Bruzón -- Applying a new algorithm to derive nonclassical symmetries / M.S. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 350

    Evolutionary Robust Control. by Feyel, Philippe

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  11. 351

    Stirling Cycle Engines : Inner Workings and Design. by Organ, Allan J.

    Published 2013
    Table of Contents: “…-- 3.6 The way forward -- 4 Equivalence conditions for volume variations -- 4.1 Kinematic configuration -- 4.2 'Additional' dead space -- 4.3 Net swept volume -- 5 The optimum versus optimization -- 5.1 An engine from Turkey rocks the boat -- 5.2 ... and an engine from Duxford -- 5.3 Schmidt on Schmidt -- 5.3.1 Volumetric compression ratio rv -- 5.3.2 Indicator diagram shape -- 5.3.3 More from the re-worked Schmidt analysis -- 5.4 Crank-slider mechanism again -- 5.5 Implications for engine design in general -- 6 Steady-flow heat transfer correlations -- 6.1 Turbulent -- or turbulent? …”
    Full text (MFA users only)
    Electronic eBook
  12. 352

    Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009

    Published 2010
    Table of Contents: “…Shafie -- The investigation of input shaping with different polarities for anti-sway control of a gantry crane system / Mohd. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 353

    Understanding smart sensors by Frank, Randy

    Published 2013
    Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
    Full text (MFA users only)
    Electronic eBook
  14. 354

    XML for DB2 information integration

    Published 2004
    Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  15. 355
  16. 356

    Sigma-Delta Converters. by De la Rosa, José M.

    Published 2018
    Table of Contents: “…4.5.2 Effect of Finite Slew Rate on CT-Ms 133 -- 4.6 Sources of Distortion in CT-Ms 134 -- 4.6.1 Nonlinearities in the Front-end Integrator 134 -- 4.6.2 Intersymbol Interference in the Feedback DAC 136 -- 4.7 Circuit Noise in CT-Ms 137 -- 4.7.1 Noise Analysis Considering NRZ Feedback DACs 137 -- 4.7.2 Noise Analysis Considering SC Feedback DACs 139 -- 4.8 Clock Jitter in CT-Ms 140 -- 4.8.1 Jitter in Return-to-zero DACs 141 -- 4.8.2 Jitter in Non-return-to-zero DACs 142 -- 4.8.3 Jitter in Switched-capacitor DACs 144 -- 4.8.4 Lingering Effect of Clock Jitter Error 145 -- 4.8.5 Reducing the Effect of Clock Jitter with FIR and Sine-shaped DACs 147 -- 4.9 Excess Loop Delay in CT-Ms 149 -- 4.9.1 Intuitive Analysis of ELD 149 -- 4.9.2 Analysis of ELD based on Impulse-invariant DT-CT Transformation 151 -- 4.9.3 Alternative ELD Compensation Techniques 154 -- 4.10 Quantizer Metastability in CT-Ms 155 -- 4.11 Summary 159 -- References 160 -- 5 Behavioral Modeling and High-level Simulation 165 -- 5.1 Systematic Design Methodology of Modulators 165 -- 5.1.1 System Partitioning and Abstraction Levels 167 -- 5.1.2 Sizing Process 167 -- 5.2 Simulation Approaches for the High-level Evaluation of Ms 169 -- 5.2.1 Alternatives to Transistor-level Simulation 169 -- 5.2.2 Event-driven Behavioral Simulation Technique 171 -- 5.2.3 Programming Languages and Behavioral Modeling Platforms 172 -- 5.3 Implementing M Behavioral Models 173 -- 5.3.1 From Circuit Analysis to Computational Algorithms 173 -- 5.3.2 Time-domain versus Frequency-domain Behavioral Models 175 -- 5.3.3 Implementing Time-domain Behavioral Models in MATLAB 178 -- 5.3.4 Building Time-domain Behavioral Models as SIMULINK C-MEX S-functions 182 -- 5.4 Efficient Behavioral Modeling of M Building Blocks using C-MEX S-functions 188 -- 5.4.1 Modeling of SC Integrators using S-functions 188 -- 5.4.1.1 Capacitor Mismatch and Nonlinearity 190.…”
    Full text (MFA users only)
    Electronic eBook
  17. 357
  18. 358

    Polymer extrusion

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  19. 359

    Visual Inspection Technology in the Hard Disc Drive Industry. by Muneesawang, Paisarn

    Published 2015
    Table of Contents: “…Introduction / Suchart Yammen / Paisarn Muneesawang -- 1.2. Algorithm for corrosion detection / Suchart Yammen / Paisarn Muneesawang -- 1.2.1. …”
    Full text (MFA users only)
    Electronic eBook
  20. 360

    Public safety networks from LTE to 5G by Yarali, Abdulrahman

    Published 2020
    Table of Contents: “…9.2.5 Flexibility 164 -- 9.3 Starting Public Safety Implementation Versus Waiting for 5G 165 -- 9.4 5GVersus 4G Public Safety Services 166 -- 9.4.1 Video Surveillance 167 -- 9.4.2 Computer-Driven Augmented Reality (AR) Helmet 167 -- 9.5 How 5GWill Shape Emergency Services 167 -- 9.6 4G LTE Defined Public Safety Content in 5G 168 -- 9.7 The Linkage Between 4G-5G Evolution and the Spectrum for Public Safety 168 -- 9.8 Conclusion 168 -- References 168 -- 10 Fifth Generation (5G) Cellular Technology 171 -- 10.1 Introduction 171 -- 10.2 Background Information on Cellular Network Generations 172 -- 10.2.1 Evolution of Mobile Technologies 172 -- 10.2.1.1 First Generation (1G) 172 -- 10.2.1.2 Second Generation (2G) Mobile Network 172 -- 10.2.1.3 Third Generation (3G) Mobile Network 172 -- 10.2.1.4 Fourth Generation (4G) Mobile Network 173 -- 10.2.1.5 Fifth Generation (5G) 173 -- 10.3 Fifth Generation (5G) and the Network of Tomorrow 174 -- 10.3.1 5G Network Architecture 176 -- 10.3.2 Wireless Communication Technologies for 5G 177 -- 10.3.2.1 Massive MIMO 177 -- 10.3.2.2 Spatial Modulation 179 -- 10.3.2.3 Machine to Machine Communication (M2M) 179 -- 10.3.2.4 Visible Light Communication (VLC) 180 -- 10.3.2.5 Green Communications 180 -- 10.3.3 5G System Environment 180 -- 10.3.4 Devices Used in 5G Technology 181 -- 10.3.5 Market Standardization and Adoption of 5G Technology 181 -- 10.3.6 Security Standardization of Cloud Applications 183 -- 10.3.7 The Global ICT Standardization Forum for India (GISFI) 184 -- 10.3.8 Energy Efficiency Enhancements 184 -- 10.3.9 Virtualization in the 5G Cellular Network 185 -- 10.3.10 Key Issues in the Development Process 185 -- 10.3.10.1 Challenges of Heterogeneous Networks 186 -- 10.3.10.2 Challenges Caused by Massive MIMO Technology 186 -- 10.3.10.3 Big Data Problem 186 -- 10.3.10.4 Shared Spectrum 186 -- 10.4 Conclusion 187 -- References 187 -- 11 Issues and Challenges of 4G and 5G for PS 189 -- 11.1 Introduction 189 -- 11.2 4G and 5GWireless Connections 190.…”
    Full text (MFA users only)
    Electronic eBook