Search Results - (((((((anti OR wind) OR mantis) OR wien) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 261

    Learning Python Design Patterns - Second Edition. by Giridhar, Chetan

    Published 2016
    Table of Contents: “…Chapter 9: Model-View-Controller -- Compound Patterns -- An introduction to compound patterns -- The Model-View-Controller pattern -- Model-knowledge of the application -- View -- the appearance -- Controller -- the glue -- A UML class diagram for the MVC design pattern -- The MVC pattern in the real world -- Modules -- Benefits of the MVC pattern -- Frequently asked questions -- Summary -- Chapter 10 -- The State Design Pattern -- Defining the State design pattern -- Understanding the State design pattern -- Understanding the State design pattern with a UML diagram -- A simple example of the State design pattern -- The State design pattern with v3.5 implementation -- Advantages/disadvantages of the State pattern -- Summary -- Chapter 11: AntiPatterns -- An introduction to AntiPatterns -- Software development AntiPatterns -- Spaghetti code -- Golden Hammer -- Lava Flow -- Copy-and-paste or cut-and-paste programming -- Software architecture AntiPatterns -- Reinventing the wheel -- Vendor lock-in -- Design by committee -- Summary -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  2. 262

    Current development of mechanical engineering and energy : selected, peer reviewed papers from the 2013 International Symposium on Vehicle, Mechanical, and Electrical Engineering (...

    Published 2014
    Table of Contents: “…Simulation and Study on Ride Comfort of Articulated Dump Truck Based on Rigid-Flex CouplingThe Hall Automotive Wheel Speed Sensor and Simulation for its Signal Processing; Wind-Induced Vibration of the Rear-View Mirrors of Car at High Speed; Research on the Affection of Vehicle Lateral Stability Related to the Improved ABS; The Quantification Research of Engine Body Defect that Tested by Ultrasonic Phased Array; Analysis of Vehicle Interior Low-Frequency Noise Based on ATV; The Engine Oil Sump Radiated Noise Optimization Design; A Novel OFDM Radar Algorithm in Vehicular Environment…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  3. 263

    Particle tracking velocimetry by Dabiri, Dana, 1963-, Pecora, Charles

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  4. 264

    Spam : a Shadow History of the Internet by Brunton, Finn, 1980-

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  5. 265

    Advanced Research in Materials and Engineering Applications

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  6. 266

    Advanced Vaccine Research : Methods for the Decade of Vaccines.

    Published 2015
    Table of Contents: “…Safety considerations of TLR agonistsChallenges for the next decade; 9: The Importance of Cell-mediated Immunity for Bacterial Vaccines ; Introduction; T-cell responses to bacterial infection; Targeting cellular immunity for novel anti-bacterial vaccine design; 10: T-cell-inducing Vaccines; Introduction; How can we measure T-cell responses?…”
    Full text (MFA users only)
    Electronic eBook
  7. 267

    Equine neurology

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  8. 268

    Linear drives for industry applications IX : selected, peer reviewed papers from the 9th International Conference on Linear Drives for Industry Applications (LDIA 2013), July 7-10,...

    Published 2013
    Table of Contents: “…Intro -- Linear Drives for Industry Applications IX -- Preface, Committees and Reviewers -- Table of Contents -- Chapter 1: Linear Motors and Other Electrical Machines -- Design and Analysis of a New Linear Fault-Tolerant Flux-Reversal Permanent-Magnet Machine -- Design of Dual-Rotor Radial Flux Permanent-Magnet Generator for Wind Power Applications -- Inductance and Flux Linkage Variation on Operation Performance for Multi-Segmented Linear PM Motor -- An Optimal Method for Minimizing Cogging Torque in Disc-Type Permanent Magnet Machines Using FEM and Genetic Algorithm -- Research on the End Effect Detent Force Reduction of Permanent Magnet Linear Synchronous Motor with Auxiliary Poles One-Piece Structure -- Performance Analysis of a Linear Motor with HTS Bulk Magnets for Driving a Prototype HTS Maglev Vehicle -- Design of a New Frog-Leg Winding Permanent-Magnet Brushless DC Motor -- Magnetic Shielding for Coreless Linear Permanent Magnet Motors -- Design and Experiment Analysis of Induction Machine Used in the Economical EV -- An Exact Analytical Solution of Halbach Arrays Permanent-Magnet Motor for Magnetic Field on Load -- Analysis, Design and Prototyping of a Low-Speed High-Torque Six-Phase Fault-Tolerant Permanent Magnet Synchronous Machine for EVs -- Investigation of a Single-Phase Oscillating PM Alternator for Free-Piston Stirling Engines -- Punching Machine Driver Research Based on Pulse Electromagnetic Force Actuator -- Characteristic Analysis of Moving Magnet Type Double-Sided Linear Synchronous Motor -- Gravity Neighborhood Estimation Algorithm Based for Cylinder Linear Motor Parameter Optimization -- Copper Losses and Rotor Losses Calculation for the BLDCM Used in a Flywheel Energy Storage System -- Optimal Design of a Double-Sided Permanent Magnet Linear Synchronous Motor for Ropeless Elevator System.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  9. 269
  10. 270
  11. 271

    Automatic Modeling and Fault Diagnosis of Timed Concurrent Discrete Event Systems : Automatische Modellierung und Fehlerdiagnose Zeitlicher Nebenläufiger Ereignisdiskreter Systeme.... by Schneider, Stefan

    Published 2015
    Table of Contents: “…3.3.3 Precision and Completeness Properties3.3.4 Identification Parameters; 3.4 Timed Distributed Modeling; 3.5 Identification of Timed Distributed Models; 3.5.1 Timed Distributed Identification Approach; 3.5.2 Precision and Completeness Properties; 3.5.3 Discussion on Shared I/Os; 3.6 Identification of Timed Distributed BMS Models; 3.6.1 Data Collection; 3.6.2 Timed Distributed Identification; 4 Partitioning of DES Models; 4.1 Preliminaries; 4.2 Causal Partitioning; 4.2.1 Distance and Causality; 4.2.2 Causal Partitioning Algorithm; 4.3 Optimal Partitioning; 4.3.1 Optimization Approach.…”
    Full text (MFA users only)
    Electronic eBook
  12. 272

    Combinatorial and Computational Mathematics : Present and Future.

    Published 2001
    Table of Contents: “…2 LIST OF APPLICABLE MATHEMATICS IN SOCIAL SCIENCE3 SOCIAL WELFARE FUNCTIONS (SWF); 4 PROSPECTS; 5 OPEN PROBLEMS; References; Twelve Views of Matroid Theory; INTRODUCTION; 1 LINEAR DEPENDENCE WITHOUT SCALARS; 2 BASIS EXCHANGE PROPERTIES; 3 GEOMETRIC LATTICES; 4 GRAPH THEORY WITHOUT VERTICES; 5 GRAPH THEORY AND LEAN LINEAR ALGEBRA; 6 VARIETIES OF FINITE MATROIDS; 7 SECRET-SHARING MATROIDS; 8 GREEDY ALGORITHMS, MATROID INTERSECTION, AND MATROID PARTITION; 9 MATRIX MULTIPLICATION AND THE CAUCHY-BINET IDENTITY; 10 BASIS GENERATING FUNCTIONS AND THE MATRIX-TREE THEOREM…”
    Full text (MFA users only)
    Electronic eBook
  13. 273

    Handbook of biometrics for forensic science

    Published 2017
    Table of Contents: “…3.5.2 Application Using Fingermarks3.5.2.1 Forensic Intelligence; 3.5.2.2 Forensic Investigation; 3.5.2.3 Forensic Evaluation; 3.5.3 Current Challenges; 3.5.3.1 Automation and Transparency; 3.5.3.2 Scalability and Interoperability; 3.5.3.3 Forensic Fingermark Processes; 3.6 Conclusion; References; 4 Challenges for Fingerprint Recognition-Spoofing, Skin Diseases, and Environmental Effects; Abstract; 4.1 Spoofing and Anti-spoofing; 4.1.1 Perspiration; 4.1.2 Spectroscopic Characteristics; 4.1.3 Ultrasonic Technology; 4.1.4 Physical Characteristics: Temperature.…”
    Full text (MFA users only)
    Electronic eBook
  14. 274
  15. 275
  16. 276

    Computational models of argument : Proceedings of COMMA 2012

    Published 2012
    Table of Contents: “…I Invited Talks -- The Long and Winding Road: Forty Years of Argumentation / Trevor Bench-Capon -- Formal Dialectic: From Aristotle to Pragma-Dialectics, and Beyond / Erik C.W. …”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 277

    Uveitis : a practical guide to the diagnosis and treatment of intraocular unflammation

    Published 2017
    Table of Contents: “…IndicationsLaser Therapy; Surgery; Steroids; Anti-VEGF Agents; Prognosis; Prevention; Conclusion; References; 11 Rubella; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 12 Syphilis; Introduction/Clinical Features; Epidemiology; Diagnostic Evaluation; Treatment and Monitoring; Prognosis; References; 13 Ocular Toxocariasis; Introduction; Epidemiology; Clinical Manifestations; Diagnosis; Treatment; Conclusion; References; 14 Ocular Toxoplasmosis; Introduction; Etiology; Epidemiology; Clinical Presentation.…”
    Full text (MFA users only)
    Electronic eBook
  18. 278

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
    Full text (MFA users only)
    Electronic eBook
  19. 279

    Peripheral ulcerative keratitis : a comprehensive guide

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  20. 280

    Advanced wireless networks : technology and business models by Glisic, Savo G.

    Published 2016
    Table of Contents: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
    Full text (MFA users only)
    Electronic eBook