Search Results - (((((((anti OR hands) OR wanting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 341

    Handbook of biometrics for forensic science

    Published 2017
    Table of Contents: “…3.5.2 Application Using Fingermarks3.5.2.1 Forensic Intelligence; 3.5.2.2 Forensic Investigation; 3.5.2.3 Forensic Evaluation; 3.5.3 Current Challenges; 3.5.3.1 Automation and Transparency; 3.5.3.2 Scalability and Interoperability; 3.5.3.3 Forensic Fingermark Processes; 3.6 Conclusion; References; 4 Challenges for Fingerprint Recognition-Spoofing, Skin Diseases, and Environmental Effects; Abstract; 4.1 Spoofing and Anti-spoofing; 4.1.1 Perspiration; 4.1.2 Spectroscopic Characteristics; 4.1.3 Ultrasonic Technology; 4.1.4 Physical Characteristics: Temperature.…”
    Full text (MFA users only)
    Electronic eBook
  2. 342

    Systemic Risk from Global Financial Derivatives. by Markose, Sheri M.

    Published 2012
    Table of Contents: “…FDIC FIs as Participants in the Five Financial Derivatives Markets; Tables; 1. Value and Market Share of Financial Derivatives for 202 FIs; B. Market Data Based Systemic Risk Measures and Financial Network Perspective; III. …”
    Full text (MFA users only)
    Electronic eBook
  3. 343

    Uveitis : a practical guide to the diagnosis and treatment of intraocular unflammation

    Published 2017
    Table of Contents: “…IndicationsLaser Therapy; Surgery; Steroids; Anti-VEGF Agents; Prognosis; Prevention; Conclusion; References; 11 Rubella; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 12 Syphilis; Introduction/Clinical Features; Epidemiology; Diagnostic Evaluation; Treatment and Monitoring; Prognosis; References; 13 Ocular Toxocariasis; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 14 Ocular Toxoplasmosis; Introduction; Etiology; Epidemiology; Clinical Presentation.…”
    Full text (MFA users only)
    Electronic eBook
  4. 344

    Numerical Methods for Eigenvalue Problems. by Börm, Steffen

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  5. 345

    Peripheral ulcerative keratitis : a comprehensive guide

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  6. 346

    Advanced wireless networks : technology and business models by Glisic, Savo G.

    Published 2016
    Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
    Full text (MFA users only)
    Electronic eBook
  7. 347

    CompTIA security+ deluxe study guide : exam SY0-301 by Dulaney, Emmett A.

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  8. 348

    Oxford Handbook of Respiratory Nursing

    Published 2009
    Table of Contents: “…Symptoms of upper respiratory tract diseaseNon-specific and extra-pulmonary symptoms; Breathlessness 1; Breathlessness 2; Cough; Sputum; Haemoptysis; Chest pain; Respiratory examination; General inspection; Examination of the hands and limbs; Examination of the head and neck; Palpation; Percussion; Auscultation; Abnormal breath sounds; Completing the respiratory assessment; 5 Respiratory investigations; Introduction; Peak expiratory flow rate (PEFR); Performing the PEFR test; Spirometry; Vital capacity; Interpretation of results; Combined obstruction and restriction; Flow volume graphs.…”
    Full text (MFA users only)
    Electronic eBook
  9. 349

    Beginning software engineering by Stephens, Rod, 1961-

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  10. 350

    Securing SQL server : protecting Your database from attackers by Cherry, Denny

    Published 2015
    Table of Contents: “…Chapter 3 -- Key ManagementInformation in this chapter; Service master key; Database master key; Encryption password management; Enterprise key management; High availability and disaster recovery for key management; Conclusions; Chapter 4 -- Database Encryption; Information in this chapter:; Database encryption; Hashing versus Encryption; Triple DES; RC Algorithms; Advanced Encryption Standard; Hashing; SHA2 and SQL Server; Encrypting Objects; Encrypting data within tables; Encrypting within Microsoft SQL Server; Encrypting Within the Application Tier.…”
    Full text (MFA users only)
    Electronic eBook
  11. 351

    Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture

    Published 2019
    Table of Contents: “…Competition regulation, anti-competitive practices and dominant positions 144 13.2.5. …”
    Full text (MFA users only)
    Electronic eBook
  12. 352

    Circuit analysis

    Published 2011
    Table of Contents: “…CIRCUIT ANALYSIS; ELECTRICAL ENGINEERINGDEVELOPMENTS; CONTENTS; PREFACE; ELEMENT STAMP ALGORITHM FOR MATRIXFORMULATION OF SYMBOLIC CIRCUITS; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  13. 353

    Reconfigurable computing : the theory and practice of FPGA-based computation

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  14. 354

    Wireless sensor systems for extreme environments : space, underwater, underground and industrial

    Published 2017
    Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
    Full text (MFA users only)
    Electronic eBook
  15. 355

    Selected papers from the 12th international symposium on electromagnetic fields in electrical engineering 2005, Volume 25, Issue 3. by Krawczk, Professor Andrzej

    Published 2006
    Table of Contents: “…Absorbing boundary conditions for compact modeling of on-chip passive structuresWide frequency band analysis of an antenna by finite elements; Application of Spice simulator in the evaluation of crosstalk computational models; Rigorous ADI-FDTD analysis of left-handed metamaterials in optimally-designed EMC applications; Comparison of numerical and measurement methods of SAR of ellipsoidal phantoms with muscle tissue electrical parameters; Numerical modeling of 3D intelligent comb drive accelerometer structure.…”
    Full text (MFA users only)
    Electronic eBook
  16. 356

    Rediscovering mathematics : you do the math by Simonson, Shai

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  17. 357

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
    Book
  18. 358

    Debates in the digital humanities 2016

    Published 2016
    Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
    Full text (MFA users only)
    Electronic eBook
  19. 359

    Multi-processor system-on-chip. 1, Architectures

    Published 2021
    Table of Contents: “…Matrix multiplication algorithm on the Plural architecture…”
    Full text (MFA users only)
    Electronic eBook
  20. 360