Search Results - (((((((anti OR win) OR semantic) OR wind) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 42
- Data processing 40
- Mathematics 35
- Mathematical models 32
- Technological innovations 23
- artificial intelligence 20
- Machine learning 18
- Algorithms 16
- Data mining 15
- Social aspects 14
- Artificial Intelligence 13
- Computer science 13
- Mathematical optimization 13
- Digital techniques 12
- History 12
- Information technology 12
- Manufacturing processes 12
- Mechanical engineering 12
- algorithms 12
- Image processing 11
- Materials 11
- Research 11
- Big data 10
- Computer networks 10
- Engineering 10
- Management 10
- Diseases 9
- Automatic control 8
- Decision making 8
- Electric power systems 8
Search alternatives:
-
541
Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics
Published 2020Table of Contents: “…5.5.2 Survivability, Availability, and Reliability 122 -- 5.6 Sovereignty, Privacy, Security, Interoperability, and Management 123 -- 5.6.1 Data Sovereignty 123 -- 5.6.2 Privacy and Security 123 -- 5.6.3 Heterogeneity and Interoperability 124 -- 5.6.4 Monitoring, Orchestration, and Management 124 -- 5.7 Trade-Offs 125 -- 5.8 Conclusion 126 -- References 126 -- 6 Incentive Schemes for User-Provided Fog Infrastructure 129 /George Iosifidis, Lin Gao, Jianwei Huang, and Leandros Tassiulas -- 6.1 Introduction 129 -- 6.2 Technology and Economic Issues in UPIs 132 -- 6.2.1 Overview of UPI models for Network Connectivity 132 -- 6.2.2 Technical Challenges of Resource Allocation 134 -- 6.2.3 Incentive Issues 135 -- 6.3 Incentive Mechanisms for Autonomous Mobile UPIs 137 -- 6.4 Incentive Mechanisms for Provider-assisted Mobile UPIs 140 -- 6.5 Incentive Mechanisms for Large-Scale Systems 143 -- 6.6 Open Challenges in Mobile UPI Incentive Mechanisms 145 -- 6.6.1 Autonomous Mobile UPIs 145 -- 6.6.1.1 Consensus of the Service Provider 145 -- 6.6.1.2 Dynamic Setting 146 -- 6.6.2 Provider-assisted Mobile UPIs 146 -- 6.6.2.1 Modeling the Users 146 -- 6.6.2.2 Incomplete Market Information 147 -- 6.7 Conclusions 147 -- References 148 -- 7 Fog-Based Service Enablement Architecture 151 /Nanxi Chen, Siobhán Clarke, and Shu Chen -- 7.1 Introduction 151 -- 7.1.1 Objectives and Challenges 152 -- 7.2 Ongoing Effort on FogSEA 153 -- 7.2.1 FogSEA Service Description 156 -- 7.2.2 Semantic Data Dependency Overlay Network 158 -- 7.2.2.1 Creation and Maintenance 159 -- 7.2.2.2 Semantic-Based Service Matchmarking 161 -- 7.3 Early Results 164 -- 7.3.1 Service Composition 165 -- 7.3.1.1 SeDDON Creation in FogSEA 167 -- 7.3.2 Related Work 168 -- 7.3.2.1 Semantic-Based Service Overlays 169 -- 7.3.2.2 Goal-Driven Planning 170 -- 7.3.2.3 Service Discovery 171 -- 7.3.3 Open Issue and Future Work 172 -- References 174 -- 8 Software-Defined Fog Orchestration for IoT Services 179 /Renyu Yang, Zhenyu Wen, David McKee, Tao Lin, Jie Xu, and Peter Garraghan.…”
Full text (MFA users only)
Electronic eBook -
542
At a distance : precursors to art and activism on the Internet
Published 2005Full text (MFA users only)
Electronic eBook -
543
Nano-Biomedical Engineering 2009 : Proceedings of the Tohoku University Global Centre of Excellence Programme Global Nano-Biomedical Engineering Education and Research Network Cent...
Published 2009Table of Contents: “…Achievement of mechanical assistance by an artificial myocardium using shape memory alloy fibre / Yasuyuki Shiraishi, Tomoyuki Yambe, Dai Homma. …”
Full text (MFA users only)
Electronic eBook -
544
-
545
Reproducibility : principles, problems, practices, and prospects
Published 2016Table of Contents: “…13.2.3 Christiaan Eijkman and Frederick Gowland Hopkins and the Discovery of Vitamins -- 13.2.4 Alexander Fleming, Howard Walter Florey, and Ernst Boris Chain and the Discovery and Development of Penicillin -- 13.3 Translation Challenges in Different Fields of Research -- 13.3.1 Vaccines against Human Immunodeficiency Virus (HIV) -- 13.3.2 Acute Stroke Research -- 13.3.3 Anti-Angiogenic Drugs in Cancer Research -- 13.3.4 Amyotrophic Lateral Sclerosis (ALS) -- 13.3.5 Microglia -- 13.4 Increasing Translational Success: Summary and Conclusions -- References -- Chapter 14 A Continuum of Reproducible Researchin Drug Development -- 14.1 Introduction -- 14.2 The Strategy of the Magic Bullet -- 14.3 Specialists and Generalists -- 14.4 From Single-Target to Multi-Target Drugs -- 14.5 Conclusions -- References -- Chapter 15 Randomness as a Building Block for Reproducibility in Local Cortical Networks -- 15.1 Introduction -- 15.2 Spike Trains and Reproducibility -- 15.3 Spike Trains -- 15.3.1 Some Technical Background: Poisson Spike Trains and Coefficient of Variation -- 15.3.2 A Simple Model: A Counter -- 15.3.3 Low Rates: Membrane Leakage -- 15.3.4 Stochastic Synapses -- 15.3.5 Balanced Excitation and Inhibition -- 15.4 Neuronal Populations -- 15.5 Summary -- References -- Chapter 16 Neural Reuse and In-Principle Limitations on Reproducibility in Cognitive Neuroscience -- 16.1 Introduction -- 16.2 The Erosion of Modular Thinking -- 16.3 Intrinsic Limits on Reproducibility -- 16.4 Going Forward -- References -- Chapter 17 On the Difference between Persons and Things -- Reproducibility in Social Contexts -- 17.1 The Problem of Other Minds and Its Evolutionary Dimension -- 17.2 Understanding the Inner Experience of Others -- 17.3 Identifying the Neural Mechanisms of Understanding Others -- 17.4 Abduction of the Functional Roles of Neural Networks.…”
Full text (MFA users only)
Electronic eBook -
546
Modern measurements : fundamentals and applications
Published 2015Table of Contents: “…PREFACE xv -- ACRONYMS xvii -- I FUNDAMENTALS 1 -- 1 MEASUREMENT MODELS AND UNCERTAINTY 3 / Alessandro Ferrero and Dario Petri -- 1.1 Introduction 3 -- 1.2 Measurement and Metrology 4 -- 1.3 Measurement Along the Centuries 5 -- 1.3.1 Measurement in Ancient Greece 6 -- 1.3.2 Measurement in the Roman Empire 6 -- 1.3.3 Measurement in the Renaissance Period 7 -- 1.3.4 Measurement in the Modern Age 8 -- 1.3.5 Measurement Today 9 -- 1.4 Measurement Model 10 -- 1.4.1 A First Measurement Model 11 -- 1.4.2 A More Complex Measurement Model 16 -- 1.4.3 Final Remarks 19 -- 1.5 Uncertainty in Measurement 20 -- 1.5.1 The Origin of the Doubt 21 -- 1.5.2 The Different Effects on the Measurement Result 23 -- 1.5.3 The Final Effect 25 -- 1.6 Uncertainty Definition and Evaluation 27 -- 1.6.1 The Error Concept and Why it Should be Abandoned 28 -- 1.6.2 Uncertainty Definition: The GUM Approach 29 -- 1.6.3 Evaluating Standard Uncertainty 31 -- 1.6.4 The Combined Standard Uncertainty 35 -- 1.7 Conclusions 39 -- Further Reading 40 -- References 41 -- Exercises 41 -- 2 THE SYSTEM OF UNITS AND THE MEASUREMENT STANDARDS 47 / Franco Cabiati -- 2.1 Introduction 47 -- 2.2 Role of the Unit in the Measurement Process 48 -- 2.3 Ideal Structure of a Unit System 50 -- 2.4 Evolution of the Unit Definition 52 -- 2.5 The SI System of Units 53 -- 2.6 Perspectives of Future SI Evolution 59 -- 2.7 Realization of Units and Primary Standards 62 -- 2.7.1 Meter Realization and Length Standards 65 -- 2.7.2 Kilogram Realization and Mass Standards: Present Situation 66 -- 2.7.3 Kilogram Realization: Future Perspective 67 -- 2.7.4 Realization of the Second and Time Standards 69 -- 2.7.5 Electrical Unit Realizations and Standards: Present Situation 71 -- 2.7.6 Electrical Units Realization and Standards: Future Perspective 76 -- 2.7.7 Kelvin Realization and Temperature Standards: Present Situation 78 -- 2.7.8 Kelvin Realization and Temperature Standards: Future Perspective 79 -- 2.7.9 Mole Realization: Present Situation 80 -- 2.7.10 Mole Realization: Future Perspective 81 -- 2.7.11 Candela Realization and Photometric Standards 82 -- 2.8 Conclusions 83 -- Further Reading 83 -- References 84 -- Exercises 84 -- 3 DIGITAL SIGNAL PROCESSING IN MEASUREMENT 87 / Alessandro Ferrero and Claudio Narduzzi -- 3.1 Introduction 87 -- 3.2 Sampling Theory 88 -- 3.2.1 Sampling and Fourier Analysis 89 -- 3.2.2 Band-Limited Signals 92 -- 3.2.3 Interpolation 95 -- 3.3 Measurement Algorithms for Periodic Signals 96 -- 3.3.1 Sampling Periodic Signals 97 -- 3.3.2 Estimation of the RMS Value 99 -- 3.4 Digital Filters 102 -- 3.5 Measuring Multi-Frequency Signals 106 -- 3.5.1 Finite-Length Sequences 107 -- 3.5.2 Discrete Fourier Transform 111 -- 3.5.3 Uniform Window 113 -- 3.5.4 Spectral Leakage 114 -- 3.5.5 Leakage Reduction by the Use of Windows 116 -- 3.6 Statistical Measurement Algorithms 119 -- 3.7 Conclusions 120 -- Further Reading 121 -- References 122 -- Exercises 122 -- 4 AD AND DA CONVERSION 125 / Niclas BjASorsell -- 4.1 Introduction 125 -- 4.2 Sampling 125 -- 4.2.1 Quantization 126 -- 4.2.2 Sampling Theorem 129 -- 4.2.3 Signal Reconstruction 130 -- 4.2.4 Anti-Alias Filter 133 -- 4.3 Analog-to-Digital Converters 133 -- 4.3.1 Flash ADCs 133 -- 4.3.2 Pipelined ADCs 134 -- 4.3.3 Integrating ADCs 134 -- 4.3.4 Successive Approximation Register ADCs 135 -- 4.4 Critical ADC Parameters 135 -- 4.4.1 Gain and Offset 136 -- 4.4.2 Integral and Differential Non-linearity 137 -- 4.4.3 Total Harmonic Distortion and Spurious-Free Dynamic Range 139 -- 4.4.4 Effective Number of Bits 139 -- 4.5 Sampling Techniques 139 -- 4.5.1 Oversampling 139 -- 4.5.2 Sigma-Delta 140 -- 4.5.3 Dither 141 -- 4.5.4 Time-Interleaved 142 -- 4.5.5 Undersampling 142 -- 4.5.6 Harmonic Sampling 143 -- 4.5.7 Equivalent-Time Sampling 143 -- 4.5.8 Model-Based Post-correction 144 -- 4.6 DAC 144 -- 4.6.1 Binary-Weighted 144 -- 4.6.2 Kelvin Divider 145 -- 4.6.3 Segmented 145 -- 4.6.4 R-2R 145 -- 4.6.5 PWM DAC 145 -- 4.7 Conclusions 146 -- Further Reading 146 -- References 146 -- Exercises 147 -- 5 BASIC INSTRUMENTS: MULTIMETERS 149 / Daniel Slomovitz -- 5.1 Introduction 149 -- 5.2 History 150 -- 5.3 Main Characteristics 153 -- 5.3.1 Ranges 153 -- 5.3.2 Number of Digits and Resolution 155 -- 5.3.3 Accuracy 158 -- 5.3.4 Loading Effects 159 -- 5.3.5 Guard 160 -- 5.3.6 Four Terminals 161 -- 5.3.7 Accessories 162 -- 5.3.8 AC Measurements 164 -- 5.3.9 Safety 167 -- 5.3.10 Calibration 170 -- 5.3.11 Selection 171 -- 5.4 Conclusions 171 -- Further Reading 172 -- References 172 -- Exercises 173 -- 6 BASIC INSTRUMENTS: OSCILLOSCOPES 175 / Jorge Fernandez Daher -- 6.1 Introduction 175 -- 6.2 Types of Waveforms 176 -- 6.2.1 Sinewave 176 -- 6.2.2 Square or Rectangular Wave 176 -- 6.2.3 Triangular or Sawtooth Wave 176 -- 6.2.4 Pulses 177 -- 6.3 Waveform Measurements 177 -- 6.3.1 Amplitude 177 -- 6.3.2 Phase Shift 177 -- 6.3.3 Period and Frequency 177 -- 6.4 Types of Oscilloscopes 177 -- 6.5 Oscilloscope Controls 181 -- 6.5.1 Vertical Controls 183 -- 6.5.2 Horizontal Controls 184 -- 6.5.3 Trigger System 185 -- 6.5.4 Display System 187 -- 6.6 Measurements 188 -- 6.6.1 Peak-to-Peak Voltage 188 -- 6.6.2 RMS Voltage 188 -- 6.6.3 Rise Time 188 -- 6.6.4 Fall Time 188 -- 6.6.5 Pulse Width 188 -- 6.6.6 Period 190 -- 6.6.7 Frequency 190 -- 6.6.8 Phase Shift Measurements 190 -- 6.6.9 Mathematical Functions 190 -- 6.7 Performance Characteristics 191 -- 6.7.1 Bandwidth 191 -- 6.7.2 Rise Time 191 -- 6.7.3 Channels 193 -- 6.7.4 Vertical Resolution 193 -- 6.7.5 Gain Accuracy 193 -- 6.7.6 Horizontal Accuracy 193 -- 6.7.7 Record Length 193 -- 6.7.8 Update Rate 194 -- 6.7.9 Connectivity 195 -- 6.8 Oscilloscope Probes 195 -- 6.8.1 Passive Probes 196 -- 6.8.2 Active Probes 197 -- 6.9 Using the Oscilloscope 199 -- 6.9.1 Grounding 199 -- 6.9.2 Calibration 199 -- 6.10 Conclusions 199 -- Further Reading 200 -- References 200 -- Exercises 201 -- 7 FUNDAMENTALS OF HARD AND SOFT MEASUREMENT 203 / Luca Mari, Paolo Carbone and Dario Petri -- 7.1 Introduction 203 -- 7.2 A Characterization of Measurement 206 -- 7.2.1 Measurement as Value Assignment 206 -- 7.2.2 Measurement as Process Performed by a Metrological System 209 -- 7.2.3 Measurement as Process Conveying Quantitative Information 209 -- 7.2.4 Measurement as Morphic Mapping 210 -- 7.2.5 Measurement as Mapping on a Given Reference Scale 213 -- 7.2.6 Measurement as Process Conveying Objective and Inter-Subjective Information 215 -- 7.2.7 The Operative Structure of Measurement 216 -- 7.2.8 A Possible Definition of?́…”
Full text (MFA users only)
Electronic eBook -
547
Cybersecurity Law, standards and regulations
Published 2020Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
Full text (MFA users only)
Electronic eBook -
548
Cognitive dynamic systems : perception--action cycle, radar, and radio
Published 2012Full text (MFA users only)
Electronic eBook -
549
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
550
Introduction to OFDM receiver design and simulation
Published 2020Table of Contents: “…2.2 Data Transmission Rate -- 2.3 Bandpass Signals -- 2.4 Digitally Modulated Signals -- 2.4.1 PAM -- 2.4.2 PSK -- 2.4.3 QAM -- 2.4.4 FSK -- 2.5 Pulse Shaping -- 2.6 Summary -- References -- 3 Multicarrier Modulation -- 3.1 Introduction -- 3.2 OFDM Waveform -- 3.3 OFDM Characteristics -- 3.3.1 Orthogonality -- 3.3.2 OFDM Spectrum -- 3.3.3 PAPR -- 3.3.4 Cyclic Prefix -- 3.3.5 FFT -- 3.4 Time and Frequency Parameters -- 3.5 Window Function -- 3.6 Digital Modulation -- 3.7 OFDM Waveform Properties -- 3.8 Summary -- References -- 4 OFDM Transmission -- 4.1 Introduction…”
Full text (MFA users only)
Electronic eBook -
551
Lippincott's primary care orthopaedics
Published 2014Table of Contents: “…The Use of Nonsteroidal Anti-Inflammatory Drugs / Chadwick R. Johr -- 66. …”
Full text (MFA users only)
Electronic eBook -
552
Mechanical, Information and Industrial Engineering
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
553
Cognitive radio communication and networking : principles and practice
Published 2012Table of Contents: “…10.3.3 Game Formulation 369 -- 10.3.4 Bayesian Equilibrium 370 -- 10.3.5 Numerical Results 371 -- 10.4 Games in Collaborative Spectrum Sensing 372 -- 10.4.1 False Report Attack 373 -- 10.4.2 Game Formulation 373 -- 10.4.3 Elements of Game 374 -- 10.4.4 Bayesian Equilibrium 376 -- 10.4.5 Numerical Results 379 -- 11 Cognitive Radio Network 381 -- 11.1 Basic Concepts of Networks 381 -- 11.1.1 Network Architecture 381 -- 11.1.2 Network Layers 382 -- 11.1.3 Cross-Layer Design 384 -- 11.1.4 Main Challenges in Cognitive Radio Networks 384 -- 11.1.5 Complex Networks 385 -- 11.2 Channel Allocation in MAC Layer 386 -- 11.2.1 Problem Formulation 386 -- 11.2.2 Scheduling Algorithm 387 -- 11.2.3 Solution 389 -- 11.2.4 Discussion 390 -- 11.3 Scheduling in MAC Layer 391 -- 11.3.1 Network Model 391 -- 11.3.2 Goal of Scheduling 393 -- 11.3.3 Scheduling Algorithm 393 -- 11.3.4 Performance of the CNC Algorithm 395 -- 11.3.5 Distributed Scheduling Algorithm 396 -- 11.4 Routing in Network Layer 396 -- 11.4.1 Challenges of Routing in Cognitive Radio 397 -- 11.4.2 Stationary Routing 398 -- 11.4.3 Dynamic Routing 402 -- 11.5 Congestion Control in Transport Layer 404 -- 11.5.1 Congestion Control in Internet 404 -- 11.5.2 Challenges in Cognitive Radio 405 -- 11.5.3 TP-CRAHN 406 -- 11.5.4 Early Start Scheme 408 -- 11.6 Complex Networks in Cognitive Radio 417 -- 11.6.1 Brief Introduction to Complex Networks 418 -- 11.6.2 Connectivity of Cognitive Radio Networks 421 -- 11.6.3 Behavior Propagation in Cognitive Radio Networks 423 -- 12 Cognitive Radio Network as Sensors 427 -- 12.1 Intrusion Detection by Machine Learning 429 -- 12.2 Joint Spectrum Sensing and Localization 429 -- 12.3 Distributed Aspect Synthetic Aperture Radar 429 -- 12.4 Wireless Tomography 433 -- 12.5 Mobile Crowdsensing 434 -- 12.6 Integration of 3S 435 -- 12.7 The Cyber-Physical System 435 -- 12.8 Computing 436 -- 12.8.1 Graphics Processor Unit 437 -- 12.8.2 Task Distribution and Load Balancing 437 -- 12.9 Security and Privacy 438.…”
Full text (MFA users only)
Electronic eBook -
554
Acoustic emission and durability of composite materials
Published 2018Full text (MFA users only)
Electronic eBook -
555
Designing and Researching of Machines and Technologies for Modern Manufacture.
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
556
-
557
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
558
-
559
Ecological modelling for sustainable development
Published 2013Table of Contents: “…Ismail -- Modelling of Climatological Wind-Driven Circulation and Thermohaline Structures of Peninsular Malaysia's Eastern Continental Shelf using Princeton Ocean Model-Halimatun Muhamad , Fredolin T. …”
Full text (MFA users only)
Electronic eBook -
560
Stirling Cycle Engines : Inner Workings and Design.
Published 2013Table of Contents: “…-- 3.6 The way forward -- 4 Equivalence conditions for volume variations -- 4.1 Kinematic configuration -- 4.2 'Additional' dead space -- 4.3 Net swept volume -- 5 The optimum versus optimization -- 5.1 An engine from Turkey rocks the boat -- 5.2 ... and an engine from Duxford -- 5.3 Schmidt on Schmidt -- 5.3.1 Volumetric compression ratio rv -- 5.3.2 Indicator diagram shape -- 5.3.3 More from the re-worked Schmidt analysis -- 5.4 Crank-slider mechanism again -- 5.5 Implications for engine design in general -- 6 Steady-flow heat transfer correlations -- 6.1 Turbulent -- or turbulent? …”
Full text (MFA users only)
Electronic eBook