Search Results - (((((((anti OR wiant) OR semantic) OR win) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 40
- Data processing 30
- Mathematics 23
- Mathematical models 21
- Technological innovations 20
- Machine learning 19
- artificial intelligence 19
- Algorithms 18
- Data mining 17
- Management 15
- algorithms 15
- Computer science 14
- Information technology 13
- Big data 12
- Computer networks 12
- Artificial Intelligence 11
- Computer algorithms 11
- Social aspects 11
- Diseases 9
- Research 9
- methods 9
- Automatic control 8
- Computational linguistics 8
- Materials 8
- Neural networks (Computer science) 8
- Political aspects 8
- Computer security 7
- Data Mining 7
- Decision making 7
- Development 7
Search alternatives:
-
481
-
482
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
483
IBM TotalStorage : SAN product, design, and optimization guide
Published 2005Table of Contents: “…-- 1.1.2 The Internet brings increased risks -- 1.1.3 Planning for business continuity -- 1.2 Using a SAN for business continuance -- 1.2.1 SANs and business continuance -- 1.3 SAN business benefits -- 1.3.1 Storage consolidation and sharing of resources -- 1.3.2 Data sharing -- 1.3.3 Nondisruptive scalability for growth -- 1.3.4 Improved backup and recovery -- 1.3.5 High performance -- 1.3.6 High availability server clustering -- 1.3.7 Improved disaster tolerance -- 1.3.8 Allow selection of best of breed storage -- 1.3.9 Ease of data migration -- 1.3.10 Reduced total costs of ownership -- 1.3.11 Storage resources match e-business enterprise needs -- Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
484
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
Full text (MFA users only)
Electronic eBook -
485
Software engineering for embedded systems : methods, practical techniques, and applications
Published 2013Table of Contents: “…-- Kinds of software reuse -- Implementing reuse by layers -- Going to the next level -- Introducing the component factory -- Factory hardware configuration -- Factory software configuration -- How the factory aids reusability -- RTOS agnosticism -- Arbitrary extensibility -- Conclusion -- References -- Example: latency vs. throughput in an eNodeB application -- Performance patterns and anti-patterns -- References -- The code optimization process -- Using the development tools -- Compiler optimization -- Basic compiler configuration -- Enabling optimizations -- Additional optimization configurations -- Using the profiler -- Background -- understanding the embedded architecture -- Resources -- Basic C optimization techniques -- Choosing the right data types -- Functions calling conventions -- Pointers and memory access -- Restrict and pointer aliasing -- Loops -- Additional tips and tricks -- General loop transformations -- Loop unrolling -- Multisampling -- Partial summation -- Software pipelining -- Example application of optimization techniques: cross-correlation -- Setup -- Original implementation -- Step 1: use intrinsics for fractional operations and specify loop counts -- Step 2: specify data alignment and modify for multisampling algorithm -- Step 3: assembly-language optimization -- Introduction -- Code size optimizations -- Compiler flags and flag mining -- Target ISA for size and performance tradeoffs -- Tuning the ABI for code size -- Caveat emptor: compiler optimization orthogonal to code size! …”
Full text (MFA users only)
Electronic eBook -
486
-
487
Ocular therapeutics handbook : a clinical manual
Published 2011Full text (MFA users only)
Electronic eBook -
488
Sigma-Delta Converters.
Published 2018Table of Contents: “…6.3.1 Hardware Emulation of CT-Ms on an FPGA 257 -- 6.3.2 GPU-accelerated Computing of CT-Ms 258 -- 6.4 Using Multi-objective Evolutionary Algorithms to Optimize Ms 259 -- 6.4.1 Combining MOEA with SIMSIDES 261 -- 6.4.2 Applying MOEA and SIMSIDES to the Synthesis of CT-Ms 262 -- 6.5 Summary 269 -- References 269 -- 7 Electrical Design of ??…”
Full text (MFA users only)
Electronic eBook -
489
Visual Inspection Technology in the Hard Disc Drive Industry.
Published 2015Table of Contents: “…Introduction / Suchart Yammen / Paisarn Muneesawang -- 1.2. Algorithm for corrosion detection / Suchart Yammen / Paisarn Muneesawang -- 1.2.1. …”
Full text (MFA users only)
Electronic eBook -
490
Fundamentals of Fluid Power Control.
Published 2009Table of Contents: “…Control-Volume Flow Continuity -- PRV Flow -- Force Balance at the Spindle -- 5.13.3 Frequency Response from a Linearized Transfer Function Analysis -- 5.14 Servovalve Dynamics -- First-Stage, Armature, and Flapper-Nozzle -- Flapper-Nozzle and Resistance Bridge Flow Characteristic -- Force Balance at the Spool -- 5.15 An Open-Loop Servovalve-Motor Drive with Line Dynamics Modeled by Lumped Approximations -- Servovalve, Dynamics Included, Underlapped Spool -- Lines, Laminar Mean Flow, Two Lump Approximations per Line, Negligible Motor Internal Volume -- Motor Flow and Torque Equations -- 5.16 Transmission Line Dynamics -- 5.16.1 Introduction -- Servovalve-Cylinder with Short Lines and Significant Actuator Volumes -- Servovalve-Motor with Long Lines and Negligible Actuator Volumes -- 5.16.2 Lossless Line Model for Z and Y -- 5.16.3 Average and Distributed Line Friction Models for Z and Y -- 5.16.4 Frequency-Domain Analysis -- 5.16.5 Servovalve-Reflected Linearized Coefficients -- 5.16.6 Modeling Systems with Nonlossless Transmission Lines, the Modal Analysis Method -- 5.16.7 Modal Analysis Applied to a Servovalve-Motor Open-Loop Drive -- 5.17 The State-Space Method for Linear Systems Modeling -- 5.17.1 Modeling Principles -- 5.17.2 Some Further Aspects of the Time-Domain Solution -- 5.17.3 The Transfer Function Concept in State Space -- 5.18 Data-Based Dynamic Modeling -- 5.18.1 Introduction -- 5.18.2 Time-Series Modeling -- 5.18.3 The Group Method of Data Handling (GMDH) Algorithm -- 5.18.4 Artificial Neural Networks -- 5.18.5 A Comparison of Time-Series, GMDH, and ANN Modeling of a Second-Order Dynamic System -- 5.18.6 Time-Series Modeling of a Position Control System -- 5.18.7 Time-Series Modeling for Fault Diagnosis -- 5.18.8 Time-Series Modeling of a Proportional PRV -- 5.18.9 GMDH Modeling of a Nitrogen-Filled Accumulator.…”
Full text (MFA users only)
Electronic eBook -
491
Public safety networks from LTE to 5G
Published 2020Table of Contents: “…9.2.5 Flexibility 164 -- 9.3 Starting Public Safety Implementation Versus Waiting for 5G 165 -- 9.4 5GVersus 4G Public Safety Services 166 -- 9.4.1 Video Surveillance 167 -- 9.4.2 Computer-Driven Augmented Reality (AR) Helmet 167 -- 9.5 How 5GWill Shape Emergency Services 167 -- 9.6 4G LTE Defined Public Safety Content in 5G 168 -- 9.7 The Linkage Between 4G-5G Evolution and the Spectrum for Public Safety 168 -- 9.8 Conclusion 168 -- References 168 -- 10 Fifth Generation (5G) Cellular Technology 171 -- 10.1 Introduction 171 -- 10.2 Background Information on Cellular Network Generations 172 -- 10.2.1 Evolution of Mobile Technologies 172 -- 10.2.1.1 First Generation (1G) 172 -- 10.2.1.2 Second Generation (2G) Mobile Network 172 -- 10.2.1.3 Third Generation (3G) Mobile Network 172 -- 10.2.1.4 Fourth Generation (4G) Mobile Network 173 -- 10.2.1.5 Fifth Generation (5G) 173 -- 10.3 Fifth Generation (5G) and the Network of Tomorrow 174 -- 10.3.1 5G Network Architecture 176 -- 10.3.2 Wireless Communication Technologies for 5G 177 -- 10.3.2.1 Massive MIMO 177 -- 10.3.2.2 Spatial Modulation 179 -- 10.3.2.3 Machine to Machine Communication (M2M) 179 -- 10.3.2.4 Visible Light Communication (VLC) 180 -- 10.3.2.5 Green Communications 180 -- 10.3.3 5G System Environment 180 -- 10.3.4 Devices Used in 5G Technology 181 -- 10.3.5 Market Standardization and Adoption of 5G Technology 181 -- 10.3.6 Security Standardization of Cloud Applications 183 -- 10.3.7 The Global ICT Standardization Forum for India (GISFI) 184 -- 10.3.8 Energy Efficiency Enhancements 184 -- 10.3.9 Virtualization in the 5G Cellular Network 185 -- 10.3.10 Key Issues in the Development Process 185 -- 10.3.10.1 Challenges of Heterogeneous Networks 186 -- 10.3.10.2 Challenges Caused by Massive MIMO Technology 186 -- 10.3.10.3 Big Data Problem 186 -- 10.3.10.4 Shared Spectrum 186 -- 10.4 Conclusion 187 -- References 187 -- 11 Issues and Challenges of 4G and 5G for PS 189 -- 11.1 Introduction 189 -- 11.2 4G and 5GWireless Connections 190.…”
Full text (MFA users only)
Electronic eBook -
492
Behind the screen : content moderation in the shadows of social media
Published 2019Full text (MFA users only)
Electronic eBook -
493
Engineering autonomous vehicles and robots : the DragonFly modular-based approach
Published 2020Full text (MFA users only)
Electronic eBook -
494
-
495
A practical guide to fetal echocardiography : normal and abnormal hearts
Published 2022Full text (MFA users only)
Electronic eBook -
496