Search Results - (((((((anti OR wind) OR mantis) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 24
- Data processing 21
- Mathematics 21
- Mathematical models 20
- Technological innovations 17
- Algorithms 15
- algorithms 15
- Machine learning 14
- Data mining 12
- Management 12
- Computer algorithms 11
- artificial intelligence 11
- Computer networks 10
- Information technology 10
- Big data 9
- Diseases 9
- Materials 9
- Mechanical engineering 9
- Research 9
- Automatic control 8
- Electric power systems 8
- Mechatronics 8
- Neural networks (Computer science) 8
- Social aspects 8
- Bioinformatics 7
- Development 7
- History 7
- Manufacturing processes 7
- Mathematical optimization 7
- Security measures 7
Search alternatives:
- wind »
- mantis »
- wien »
- share »
-
261
Learning Python Design Patterns - Second Edition.
Published 2016Table of Contents: “…Chapter 9: Model-View-Controller -- Compound Patterns -- An introduction to compound patterns -- The Model-View-Controller pattern -- Model-knowledge of the application -- View -- the appearance -- Controller -- the glue -- A UML class diagram for the MVC design pattern -- The MVC pattern in the real world -- Modules -- Benefits of the MVC pattern -- Frequently asked questions -- Summary -- Chapter 10 -- The State Design Pattern -- Defining the State design pattern -- Understanding the State design pattern -- Understanding the State design pattern with a UML diagram -- A simple example of the State design pattern -- The State design pattern with v3.5 implementation -- Advantages/disadvantages of the State pattern -- Summary -- Chapter 11: AntiPatterns -- An introduction to AntiPatterns -- Software development AntiPatterns -- Spaghetti code -- Golden Hammer -- Lava Flow -- Copy-and-paste or cut-and-paste programming -- Software architecture AntiPatterns -- Reinventing the wheel -- Vendor lock-in -- Design by committee -- Summary -- Index.…”
Full text (MFA users only)
Electronic eBook -
262
Current development of mechanical engineering and energy : selected, peer reviewed papers from the 2013 International Symposium on Vehicle, Mechanical, and Electrical Engineering (...
Published 2014Table of Contents: “…Simulation and Study on Ride Comfort of Articulated Dump Truck Based on Rigid-Flex CouplingThe Hall Automotive Wheel Speed Sensor and Simulation for its Signal Processing; Wind-Induced Vibration of the Rear-View Mirrors of Car at High Speed; Research on the Affection of Vehicle Lateral Stability Related to the Improved ABS; The Quantification Research of Engine Body Defect that Tested by Ultrasonic Phased Array; Analysis of Vehicle Interior Low-Frequency Noise Based on ATV; The Engine Oil Sump Radiated Noise Optimization Design; A Novel OFDM Radar Algorithm in Vehicular Environment…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
263
-
264
-
265
Advanced Research in Materials and Engineering Applications
Published 2015Full text (MFA users only)
Electronic eBook -
266
Advanced Vaccine Research : Methods for the Decade of Vaccines.
Published 2015Table of Contents: “…Safety considerations of TLR agonistsChallenges for the next decade; 9: The Importance of Cell-mediated Immunity for Bacterial Vaccines ; Introduction; T-cell responses to bacterial infection; Targeting cellular immunity for novel anti-bacterial vaccine design; 10: T-cell-inducing Vaccines; Introduction; How can we measure T-cell responses?…”
Full text (MFA users only)
Electronic eBook -
267
-
268
Linear drives for industry applications IX : selected, peer reviewed papers from the 9th International Conference on Linear Drives for Industry Applications (LDIA 2013), July 7-10,...
Published 2013Table of Contents: “…Intro -- Linear Drives for Industry Applications IX -- Preface, Committees and Reviewers -- Table of Contents -- Chapter 1: Linear Motors and Other Electrical Machines -- Design and Analysis of a New Linear Fault-Tolerant Flux-Reversal Permanent-Magnet Machine -- Design of Dual-Rotor Radial Flux Permanent-Magnet Generator for Wind Power Applications -- Inductance and Flux Linkage Variation on Operation Performance for Multi-Segmented Linear PM Motor -- An Optimal Method for Minimizing Cogging Torque in Disc-Type Permanent Magnet Machines Using FEM and Genetic Algorithm -- Research on the End Effect Detent Force Reduction of Permanent Magnet Linear Synchronous Motor with Auxiliary Poles One-Piece Structure -- Performance Analysis of a Linear Motor with HTS Bulk Magnets for Driving a Prototype HTS Maglev Vehicle -- Design of a New Frog-Leg Winding Permanent-Magnet Brushless DC Motor -- Magnetic Shielding for Coreless Linear Permanent Magnet Motors -- Design and Experiment Analysis of Induction Machine Used in the Economical EV -- An Exact Analytical Solution of Halbach Arrays Permanent-Magnet Motor for Magnetic Field on Load -- Analysis, Design and Prototyping of a Low-Speed High-Torque Six-Phase Fault-Tolerant Permanent Magnet Synchronous Machine for EVs -- Investigation of a Single-Phase Oscillating PM Alternator for Free-Piston Stirling Engines -- Punching Machine Driver Research Based on Pulse Electromagnetic Force Actuator -- Characteristic Analysis of Moving Magnet Type Double-Sided Linear Synchronous Motor -- Gravity Neighborhood Estimation Algorithm Based for Cylinder Linear Motor Parameter Optimization -- Copper Losses and Rotor Losses Calculation for the BLDCM Used in a Flywheel Energy Storage System -- Optimal Design of a Double-Sided Permanent Magnet Linear Synchronous Motor for Ropeless Elevator System.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
269
Multicriteria decision aid and artificial intelligence : links, theory and applications
Published 2013Full text (MFA users only)
Electronic eBook -
270
Chemical engineering and material properties III : selected, peer reviewed papers from the 2014 4th International Symposium on Chemical Engineering and Material Properties (ISCEMP...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
271
Automatic Modeling and Fault Diagnosis of Timed Concurrent Discrete Event Systems : Automatische Modellierung und Fehlerdiagnose Zeitlicher Nebenläufiger Ereignisdiskreter Systeme....
Published 2015Table of Contents: “…3.3.3 Precision and Completeness Properties3.3.4 Identification Parameters; 3.4 Timed Distributed Modeling; 3.5 Identification of Timed Distributed Models; 3.5.1 Timed Distributed Identification Approach; 3.5.2 Precision and Completeness Properties; 3.5.3 Discussion on Shared I/Os; 3.6 Identification of Timed Distributed BMS Models; 3.6.1 Data Collection; 3.6.2 Timed Distributed Identification; 4 Partitioning of DES Models; 4.1 Preliminaries; 4.2 Causal Partitioning; 4.2.1 Distance and Causality; 4.2.2 Causal Partitioning Algorithm; 4.3 Optimal Partitioning; 4.3.1 Optimization Approach.…”
Full text (MFA users only)
Electronic eBook -
272
Combinatorial and Computational Mathematics : Present and Future.
Published 2001Table of Contents: “…2 LIST OF APPLICABLE MATHEMATICS IN SOCIAL SCIENCE3 SOCIAL WELFARE FUNCTIONS (SWF); 4 PROSPECTS; 5 OPEN PROBLEMS; References; Twelve Views of Matroid Theory; INTRODUCTION; 1 LINEAR DEPENDENCE WITHOUT SCALARS; 2 BASIS EXCHANGE PROPERTIES; 3 GEOMETRIC LATTICES; 4 GRAPH THEORY WITHOUT VERTICES; 5 GRAPH THEORY AND LEAN LINEAR ALGEBRA; 6 VARIETIES OF FINITE MATROIDS; 7 SECRET-SHARING MATROIDS; 8 GREEDY ALGORITHMS, MATROID INTERSECTION, AND MATROID PARTITION; 9 MATRIX MULTIPLICATION AND THE CAUCHY-BINET IDENTITY; 10 BASIS GENERATING FUNCTIONS AND THE MATRIX-TREE THEOREM…”
Full text (MFA users only)
Electronic eBook -
273
Handbook of biometrics for forensic science
Published 2017Table of Contents: “…3.5.2 Application Using Fingermarks3.5.2.1 Forensic Intelligence; 3.5.2.2 Forensic Investigation; 3.5.2.3 Forensic Evaluation; 3.5.3 Current Challenges; 3.5.3.1 Automation and Transparency; 3.5.3.2 Scalability and Interoperability; 3.5.3.3 Forensic Fingermark Processes; 3.6 Conclusion; References; 4 Challenges for Fingerprint Recognition-Spoofing, Skin Diseases, and Environmental Effects; Abstract; 4.1 Spoofing and Anti-spoofing; 4.1.1 Perspiration; 4.1.2 Spectroscopic Characteristics; 4.1.3 Ultrasonic Technology; 4.1.4 Physical Characteristics: Temperature.…”
Full text (MFA users only)
Electronic eBook -
274
Language, vision, and music : selected papers from the 8th International Workshop on the Cognitive Science of Natural Language Processing, Galway, Ireland, 1999
Published 2002Full text (MFA users only)
Electronic Conference Proceeding eBook -
275
Biological systematics : principles and applications
Published 2021Full text (MFA users only)
Electronic eBook -
276
Computational models of argument : Proceedings of COMMA 2012
Published 2012Table of Contents: “…I Invited Talks -- The Long and Winding Road: Forty Years of Argumentation / Trevor Bench-Capon -- Formal Dialectic: From Aristotle to Pragma-Dialectics, and Beyond / Erik C.W. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
277
Uveitis : a practical guide to the diagnosis and treatment of intraocular unflammation
Published 2017Table of Contents: “…IndicationsLaser Therapy; Surgery; Steroids; Anti-VEGF Agents; Prognosis; Prevention; Conclusion; References; 11 Rubella; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 12 Syphilis; Introduction/Clinical Features; Epidemiology; Diagnostic Evaluation; Treatment and Monitoring; Prognosis; References; 13 Ocular Toxocariasis; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 14 Ocular Toxoplasmosis; Introduction; Etiology; Epidemiology; Clinical Presentation.…”
Full text (MFA users only)
Electronic eBook -
278
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
279
Peripheral ulcerative keratitis : a comprehensive guide
Published 2017Full text (MFA users only)
Electronic eBook -
280
Advanced wireless networks : technology and business models
Published 2016Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
Full text (MFA users only)
Electronic eBook