Search Results - (((((((anti OR win) OR semantic) OR wind) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 541

    Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics

    Published 2020
    Table of Contents: “…5.5.2 Survivability, Availability, and Reliability 122 -- 5.6 Sovereignty, Privacy, Security, Interoperability, and Management 123 -- 5.6.1 Data Sovereignty 123 -- 5.6.2 Privacy and Security 123 -- 5.6.3 Heterogeneity and Interoperability 124 -- 5.6.4 Monitoring, Orchestration, and Management 124 -- 5.7 Trade-Offs 125 -- 5.8 Conclusion 126 -- References 126 -- 6 Incentive Schemes for User-Provided Fog Infrastructure 129 /George Iosifidis, Lin Gao, Jianwei Huang, and Leandros Tassiulas -- 6.1 Introduction 129 -- 6.2 Technology and Economic Issues in UPIs 132 -- 6.2.1 Overview of UPI models for Network Connectivity 132 -- 6.2.2 Technical Challenges of Resource Allocation 134 -- 6.2.3 Incentive Issues 135 -- 6.3 Incentive Mechanisms for Autonomous Mobile UPIs 137 -- 6.4 Incentive Mechanisms for Provider-assisted Mobile UPIs 140 -- 6.5 Incentive Mechanisms for Large-Scale Systems 143 -- 6.6 Open Challenges in Mobile UPI Incentive Mechanisms 145 -- 6.6.1 Autonomous Mobile UPIs 145 -- 6.6.1.1 Consensus of the Service Provider 145 -- 6.6.1.2 Dynamic Setting 146 -- 6.6.2 Provider-assisted Mobile UPIs 146 -- 6.6.2.1 Modeling the Users 146 -- 6.6.2.2 Incomplete Market Information 147 -- 6.7 Conclusions 147 -- References 148 -- 7 Fog-Based Service Enablement Architecture 151 /Nanxi Chen, Siobhán Clarke, and Shu Chen -- 7.1 Introduction 151 -- 7.1.1 Objectives and Challenges 152 -- 7.2 Ongoing Effort on FogSEA 153 -- 7.2.1 FogSEA Service Description 156 -- 7.2.2 Semantic Data Dependency Overlay Network 158 -- 7.2.2.1 Creation and Maintenance 159 -- 7.2.2.2 Semantic-Based Service Matchmarking 161 -- 7.3 Early Results 164 -- 7.3.1 Service Composition 165 -- 7.3.1.1 SeDDON Creation in FogSEA 167 -- 7.3.2 Related Work 168 -- 7.3.2.1 Semantic-Based Service Overlays 169 -- 7.3.2.2 Goal-Driven Planning 170 -- 7.3.2.3 Service Discovery 171 -- 7.3.3 Open Issue and Future Work 172 -- References 174 -- 8 Software-Defined Fog Orchestration for IoT Services 179 /Renyu Yang, Zhenyu Wen, David McKee, Tao Lin, Jie Xu, and Peter Garraghan.…”
    Full text (MFA users only)
    Electronic eBook
  2. 542

    At a distance : precursors to art and activism on the Internet

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  3. 543

    Nano-Biomedical Engineering 2009 : Proceedings of the Tohoku University Global Centre of Excellence Programme Global Nano-Biomedical Engineering Education and Research Network Cent...

    Published 2009
    Table of Contents: “…Achievement of mechanical assistance by an artificial myocardium using shape memory alloy fibre / Yasuyuki Shiraishi, Tomoyuki Yambe, Dai Homma. …”
    Full text (MFA users only)
    Electronic eBook
  4. 544

    The 5-minute sports medicine consult

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  5. 545

    Reproducibility : principles, problems, practices, and prospects

    Published 2016
    Table of Contents: “…13.2.3 Christiaan Eijkman and Frederick Gowland Hopkins and the Discovery of Vitamins -- 13.2.4 Alexander Fleming, Howard Walter Florey, and Ernst Boris Chain and the Discovery and Development of Penicillin -- 13.3 Translation Challenges in Different Fields of Research -- 13.3.1 Vaccines against Human Immunodeficiency Virus (HIV) -- 13.3.2 Acute Stroke Research -- 13.3.3 Anti-Angiogenic Drugs in Cancer Research -- 13.3.4 Amyotrophic Lateral Sclerosis (ALS) -- 13.3.5 Microglia -- 13.4 Increasing Translational Success: Summary and Conclusions -- References -- Chapter 14 A Continuum of Reproducible Researchin Drug Development -- 14.1 Introduction -- 14.2 The Strategy of the Magic Bullet -- 14.3 Specialists and Generalists -- 14.4 From Single-Target to Multi-Target Drugs -- 14.5 Conclusions -- References -- Chapter 15 Randomness as a Building Block for Reproducibility in Local Cortical Networks -- 15.1 Introduction -- 15.2 Spike Trains and Reproducibility -- 15.3 Spike Trains -- 15.3.1 Some Technical Background: Poisson Spike Trains and Coefficient of Variation -- 15.3.2 A Simple Model: A Counter -- 15.3.3 Low Rates: Membrane Leakage -- 15.3.4 Stochastic Synapses -- 15.3.5 Balanced Excitation and Inhibition -- 15.4 Neuronal Populations -- 15.5 Summary -- References -- Chapter 16 Neural Reuse and In-Principle Limitations on Reproducibility in Cognitive Neuroscience -- 16.1 Introduction -- 16.2 The Erosion of Modular Thinking -- 16.3 Intrinsic Limits on Reproducibility -- 16.4 Going Forward -- References -- Chapter 17 On the Difference between Persons and Things -- Reproducibility in Social Contexts -- 17.1 The Problem of Other Minds and Its Evolutionary Dimension -- 17.2 Understanding the Inner Experience of Others -- 17.3 Identifying the Neural Mechanisms of Understanding Others -- 17.4 Abduction of the Functional Roles of Neural Networks.…”
    Full text (MFA users only)
    Electronic eBook
  6. 546

    Modern measurements : fundamentals and applications

    Published 2015
    Table of Contents: “…PREFACE xv -- ACRONYMS xvii -- I FUNDAMENTALS 1 -- 1 MEASUREMENT MODELS AND UNCERTAINTY 3 / Alessandro Ferrero and Dario Petri -- 1.1 Introduction 3 -- 1.2 Measurement and Metrology 4 -- 1.3 Measurement Along the Centuries 5 -- 1.3.1 Measurement in Ancient Greece 6 -- 1.3.2 Measurement in the Roman Empire 6 -- 1.3.3 Measurement in the Renaissance Period 7 -- 1.3.4 Measurement in the Modern Age 8 -- 1.3.5 Measurement Today 9 -- 1.4 Measurement Model 10 -- 1.4.1 A First Measurement Model 11 -- 1.4.2 A More Complex Measurement Model 16 -- 1.4.3 Final Remarks 19 -- 1.5 Uncertainty in Measurement 20 -- 1.5.1 The Origin of the Doubt 21 -- 1.5.2 The Different Effects on the Measurement Result 23 -- 1.5.3 The Final Effect 25 -- 1.6 Uncertainty Definition and Evaluation 27 -- 1.6.1 The Error Concept and Why it Should be Abandoned 28 -- 1.6.2 Uncertainty Definition: The GUM Approach 29 -- 1.6.3 Evaluating Standard Uncertainty 31 -- 1.6.4 The Combined Standard Uncertainty 35 -- 1.7 Conclusions 39 -- Further Reading 40 -- References 41 -- Exercises 41 -- 2 THE SYSTEM OF UNITS AND THE MEASUREMENT STANDARDS 47 / Franco Cabiati -- 2.1 Introduction 47 -- 2.2 Role of the Unit in the Measurement Process 48 -- 2.3 Ideal Structure of a Unit System 50 -- 2.4 Evolution of the Unit Definition 52 -- 2.5 The SI System of Units 53 -- 2.6 Perspectives of Future SI Evolution 59 -- 2.7 Realization of Units and Primary Standards 62 -- 2.7.1 Meter Realization and Length Standards 65 -- 2.7.2 Kilogram Realization and Mass Standards: Present Situation 66 -- 2.7.3 Kilogram Realization: Future Perspective 67 -- 2.7.4 Realization of the Second and Time Standards 69 -- 2.7.5 Electrical Unit Realizations and Standards: Present Situation 71 -- 2.7.6 Electrical Units Realization and Standards: Future Perspective 76 -- 2.7.7 Kelvin Realization and Temperature Standards: Present Situation 78 -- 2.7.8 Kelvin Realization and Temperature Standards: Future Perspective 79 -- 2.7.9 Mole Realization: Present Situation 80 -- 2.7.10 Mole Realization: Future Perspective 81 -- 2.7.11 Candela Realization and Photometric Standards 82 -- 2.8 Conclusions 83 -- Further Reading 83 -- References 84 -- Exercises 84 -- 3 DIGITAL SIGNAL PROCESSING IN MEASUREMENT 87 / Alessandro Ferrero and Claudio Narduzzi -- 3.1 Introduction 87 -- 3.2 Sampling Theory 88 -- 3.2.1 Sampling and Fourier Analysis 89 -- 3.2.2 Band-Limited Signals 92 -- 3.2.3 Interpolation 95 -- 3.3 Measurement Algorithms for Periodic Signals 96 -- 3.3.1 Sampling Periodic Signals 97 -- 3.3.2 Estimation of the RMS Value 99 -- 3.4 Digital Filters 102 -- 3.5 Measuring Multi-Frequency Signals 106 -- 3.5.1 Finite-Length Sequences 107 -- 3.5.2 Discrete Fourier Transform 111 -- 3.5.3 Uniform Window 113 -- 3.5.4 Spectral Leakage 114 -- 3.5.5 Leakage Reduction by the Use of Windows 116 -- 3.6 Statistical Measurement Algorithms 119 -- 3.7 Conclusions 120 -- Further Reading 121 -- References 122 -- Exercises 122 -- 4 AD AND DA CONVERSION 125 / Niclas BjASorsell -- 4.1 Introduction 125 -- 4.2 Sampling 125 -- 4.2.1 Quantization 126 -- 4.2.2 Sampling Theorem 129 -- 4.2.3 Signal Reconstruction 130 -- 4.2.4 Anti-Alias Filter 133 -- 4.3 Analog-to-Digital Converters 133 -- 4.3.1 Flash ADCs 133 -- 4.3.2 Pipelined ADCs 134 -- 4.3.3 Integrating ADCs 134 -- 4.3.4 Successive Approximation Register ADCs 135 -- 4.4 Critical ADC Parameters 135 -- 4.4.1 Gain and Offset 136 -- 4.4.2 Integral and Differential Non-linearity 137 -- 4.4.3 Total Harmonic Distortion and Spurious-Free Dynamic Range 139 -- 4.4.4 Effective Number of Bits 139 -- 4.5 Sampling Techniques 139 -- 4.5.1 Oversampling 139 -- 4.5.2 Sigma-Delta 140 -- 4.5.3 Dither 141 -- 4.5.4 Time-Interleaved 142 -- 4.5.5 Undersampling 142 -- 4.5.6 Harmonic Sampling 143 -- 4.5.7 Equivalent-Time Sampling 143 -- 4.5.8 Model-Based Post-correction 144 -- 4.6 DAC 144 -- 4.6.1 Binary-Weighted 144 -- 4.6.2 Kelvin Divider 145 -- 4.6.3 Segmented 145 -- 4.6.4 R-2R 145 -- 4.6.5 PWM DAC 145 -- 4.7 Conclusions 146 -- Further Reading 146 -- References 146 -- Exercises 147 -- 5 BASIC INSTRUMENTS: MULTIMETERS 149 / Daniel Slomovitz -- 5.1 Introduction 149 -- 5.2 History 150 -- 5.3 Main Characteristics 153 -- 5.3.1 Ranges 153 -- 5.3.2 Number of Digits and Resolution 155 -- 5.3.3 Accuracy 158 -- 5.3.4 Loading Effects 159 -- 5.3.5 Guard 160 -- 5.3.6 Four Terminals 161 -- 5.3.7 Accessories 162 -- 5.3.8 AC Measurements 164 -- 5.3.9 Safety 167 -- 5.3.10 Calibration 170 -- 5.3.11 Selection 171 -- 5.4 Conclusions 171 -- Further Reading 172 -- References 172 -- Exercises 173 -- 6 BASIC INSTRUMENTS: OSCILLOSCOPES 175 / Jorge Fernandez Daher -- 6.1 Introduction 175 -- 6.2 Types of Waveforms 176 -- 6.2.1 Sinewave 176 -- 6.2.2 Square or Rectangular Wave 176 -- 6.2.3 Triangular or Sawtooth Wave 176 -- 6.2.4 Pulses 177 -- 6.3 Waveform Measurements 177 -- 6.3.1 Amplitude 177 -- 6.3.2 Phase Shift 177 -- 6.3.3 Period and Frequency 177 -- 6.4 Types of Oscilloscopes 177 -- 6.5 Oscilloscope Controls 181 -- 6.5.1 Vertical Controls 183 -- 6.5.2 Horizontal Controls 184 -- 6.5.3 Trigger System 185 -- 6.5.4 Display System 187 -- 6.6 Measurements 188 -- 6.6.1 Peak-to-Peak Voltage 188 -- 6.6.2 RMS Voltage 188 -- 6.6.3 Rise Time 188 -- 6.6.4 Fall Time 188 -- 6.6.5 Pulse Width 188 -- 6.6.6 Period 190 -- 6.6.7 Frequency 190 -- 6.6.8 Phase Shift Measurements 190 -- 6.6.9 Mathematical Functions 190 -- 6.7 Performance Characteristics 191 -- 6.7.1 Bandwidth 191 -- 6.7.2 Rise Time 191 -- 6.7.3 Channels 193 -- 6.7.4 Vertical Resolution 193 -- 6.7.5 Gain Accuracy 193 -- 6.7.6 Horizontal Accuracy 193 -- 6.7.7 Record Length 193 -- 6.7.8 Update Rate 194 -- 6.7.9 Connectivity 195 -- 6.8 Oscilloscope Probes 195 -- 6.8.1 Passive Probes 196 -- 6.8.2 Active Probes 197 -- 6.9 Using the Oscilloscope 199 -- 6.9.1 Grounding 199 -- 6.9.2 Calibration 199 -- 6.10 Conclusions 199 -- Further Reading 200 -- References 200 -- Exercises 201 -- 7 FUNDAMENTALS OF HARD AND SOFT MEASUREMENT 203 / Luca Mari, Paolo Carbone and Dario Petri -- 7.1 Introduction 203 -- 7.2 A Characterization of Measurement 206 -- 7.2.1 Measurement as Value Assignment 206 -- 7.2.2 Measurement as Process Performed by a Metrological System 209 -- 7.2.3 Measurement as Process Conveying Quantitative Information 209 -- 7.2.4 Measurement as Morphic Mapping 210 -- 7.2.5 Measurement as Mapping on a Given Reference Scale 213 -- 7.2.6 Measurement as Process Conveying Objective and Inter-Subjective Information 215 -- 7.2.7 The Operative Structure of Measurement 216 -- 7.2.8 A Possible Definition of?́…”
    Full text (MFA users only)
    Electronic eBook
  7. 547

    Cybersecurity Law, standards and regulations by Schreider, Tari

    Published 2020
    Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
    Full text (MFA users only)
    Electronic eBook
  8. 548
  9. 549

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  10. 550

    Introduction to OFDM receiver design and simulation by Liu, Y. J.

    Published 2020
    Table of Contents: “…2.2 Data Transmission Rate -- 2.3 Bandpass Signals -- 2.4 Digitally Modulated Signals -- 2.4.1 PAM -- 2.4.2 PSK -- 2.4.3 QAM -- 2.4.4 FSK -- 2.5 Pulse Shaping -- 2.6 Summary -- References -- 3 Multicarrier Modulation -- 3.1 Introduction -- 3.2 OFDM Waveform -- 3.3 OFDM Characteristics -- 3.3.1 Orthogonality -- 3.3.2 OFDM Spectrum -- 3.3.3 PAPR -- 3.3.4 Cyclic Prefix -- 3.3.5 FFT -- 3.4 Time and Frequency Parameters -- 3.5 Window Function -- 3.6 Digital Modulation -- 3.7 OFDM Waveform Properties -- 3.8 Summary -- References -- 4 OFDM Transmission -- 4.1 Introduction…”
    Full text (MFA users only)
    Electronic eBook
  11. 551

    Lippincott's primary care orthopaedics

    Published 2014
    Table of Contents: “…The Use of Nonsteroidal Anti-Inflammatory Drugs / Chadwick R. Johr -- 66. …”
    Full text (MFA users only)
    Electronic eBook
  12. 552

    Mechanical, Information and Industrial Engineering by Wang, Li

    Published 2015
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 553

    Cognitive radio communication and networking : principles and practice by Qiu, Robert C., 1966-

    Published 2012
    Table of Contents: “…10.3.3 Game Formulation 369 -- 10.3.4 Bayesian Equilibrium 370 -- 10.3.5 Numerical Results 371 -- 10.4 Games in Collaborative Spectrum Sensing 372 -- 10.4.1 False Report Attack 373 -- 10.4.2 Game Formulation 373 -- 10.4.3 Elements of Game 374 -- 10.4.4 Bayesian Equilibrium 376 -- 10.4.5 Numerical Results 379 -- 11 Cognitive Radio Network 381 -- 11.1 Basic Concepts of Networks 381 -- 11.1.1 Network Architecture 381 -- 11.1.2 Network Layers 382 -- 11.1.3 Cross-Layer Design 384 -- 11.1.4 Main Challenges in Cognitive Radio Networks 384 -- 11.1.5 Complex Networks 385 -- 11.2 Channel Allocation in MAC Layer 386 -- 11.2.1 Problem Formulation 386 -- 11.2.2 Scheduling Algorithm 387 -- 11.2.3 Solution 389 -- 11.2.4 Discussion 390 -- 11.3 Scheduling in MAC Layer 391 -- 11.3.1 Network Model 391 -- 11.3.2 Goal of Scheduling 393 -- 11.3.3 Scheduling Algorithm 393 -- 11.3.4 Performance of the CNC Algorithm 395 -- 11.3.5 Distributed Scheduling Algorithm 396 -- 11.4 Routing in Network Layer 396 -- 11.4.1 Challenges of Routing in Cognitive Radio 397 -- 11.4.2 Stationary Routing 398 -- 11.4.3 Dynamic Routing 402 -- 11.5 Congestion Control in Transport Layer 404 -- 11.5.1 Congestion Control in Internet 404 -- 11.5.2 Challenges in Cognitive Radio 405 -- 11.5.3 TP-CRAHN 406 -- 11.5.4 Early Start Scheme 408 -- 11.6 Complex Networks in Cognitive Radio 417 -- 11.6.1 Brief Introduction to Complex Networks 418 -- 11.6.2 Connectivity of Cognitive Radio Networks 421 -- 11.6.3 Behavior Propagation in Cognitive Radio Networks 423 -- 12 Cognitive Radio Network as Sensors 427 -- 12.1 Intrusion Detection by Machine Learning 429 -- 12.2 Joint Spectrum Sensing and Localization 429 -- 12.3 Distributed Aspect Synthetic Aperture Radar 429 -- 12.4 Wireless Tomography 433 -- 12.5 Mobile Crowdsensing 434 -- 12.6 Integration of 3S 435 -- 12.7 The Cyber-Physical System 435 -- 12.8 Computing 436 -- 12.8.1 Graphics Processor Unit 437 -- 12.8.2 Task Distribution and Load Balancing 437 -- 12.9 Security and Privacy 438.…”
    Full text (MFA users only)
    Electronic eBook
  14. 554
  15. 555

    Designing and Researching of Machines and Technologies for Modern Manufacture.

    Published 2015
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 556

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  17. 557

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
    Full text (MFA users only)
    Electronic eBook
  18. 558

    Evolutionary Robust Control. by Feyel, Philippe

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  19. 559

    Ecological modelling for sustainable development

    Published 2013
    Table of Contents: “…Ismail -- Modelling of Climatological Wind-Driven Circulation and Thermohaline Structures of Peninsular Malaysia's Eastern Continental Shelf using Princeton Ocean Model-Halimatun Muhamad , Fredolin T. …”
    Full text (MFA users only)
    Electronic eBook
  20. 560

    Stirling Cycle Engines : Inner Workings and Design. by Organ, Allan J.

    Published 2013
    Table of Contents: “…-- 3.6 The way forward -- 4 Equivalence conditions for volume variations -- 4.1 Kinematic configuration -- 4.2 'Additional' dead space -- 4.3 Net swept volume -- 5 The optimum versus optimization -- 5.1 An engine from Turkey rocks the boat -- 5.2 ... and an engine from Duxford -- 5.3 Schmidt on Schmidt -- 5.3.1 Volumetric compression ratio rv -- 5.3.2 Indicator diagram shape -- 5.3.3 More from the re-worked Schmidt analysis -- 5.4 Crank-slider mechanism again -- 5.5 Implications for engine design in general -- 6 Steady-flow heat transfer correlations -- 6.1 Turbulent -- or turbulent? …”
    Full text (MFA users only)
    Electronic eBook