Search Results - (((((((anti OR wkant) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 681

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  2. 682

    Handbook of convex optimization methods in imaging science

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  3. 683

    Software engineering for embedded systems : methods, practical techniques, and applications

    Published 2013
    Table of Contents: “…-- Kinds of software reuse -- Implementing reuse by layers -- Going to the next level -- Introducing the component factory -- Factory hardware configuration -- Factory software configuration -- How the factory aids reusability -- RTOS agnosticism -- Arbitrary extensibility -- Conclusion -- References -- Example: latency vs. throughput in an eNodeB application -- Performance patterns and anti-patterns -- References -- The code optimization process -- Using the development tools -- Compiler optimization -- Basic compiler configuration -- Enabling optimizations -- Additional optimization configurations -- Using the profiler -- Background -- understanding the embedded architecture -- Resources -- Basic C optimization techniques -- Choosing the right data types -- Functions calling conventions -- Pointers and memory access -- Restrict and pointer aliasing -- Loops -- Additional tips and tricks -- General loop transformations -- Loop unrolling -- Multisampling -- Partial summation -- Software pipelining -- Example application of optimization techniques: cross-correlation -- Setup -- Original implementation -- Step 1: use intrinsics for fractional operations and specify loop counts -- Step 2: specify data alignment and modify for multisampling algorithm -- Step 3: assembly-language optimization -- Introduction -- Code size optimizations -- Compiler flags and flag mining -- Target ISA for size and performance tradeoffs -- Tuning the ABI for code size -- Caveat emptor: compiler optimization orthogonal to code size! …”
    Full text (MFA users only)
    Electronic eBook
  4. 684
  5. 685

    Data Analysis and Applications 1 : New and Classical Approaches. by Skiadas, Christos

    Published 2019
    Table of Contents: “…Similarity to homogeneous distributional shapes1.3.11. Stability; 1.3.12. Further Aspects; 1.4. …”
    Full text (MFA users only)
    Electronic eBook
  6. 686

    Advanced mathematical & computational tools in metrology & testing VIII

    Published 2009
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 687

    The Dictionary of Critical Social Sciences. by Young, T. R.

    Published 2019
    Table of Contents: “…Cover -- Half Title -- Title -- Copyright -- Dedication -- Preface -- Authors' Note -- Acknowledgments -- A -- AARP -- Abduction -- Abolitionism -- Abortion -- Abuse, Child -- Abuse, Spousal -- Accenting the Sign -- Act -- Act, Philosophy of -- Acton, Lord (1834-1902) -- Actor -- Adolescence -- Adorno, Theodor (1903-1969) -- Adventist Religious Groups -- Advertising -- Aesthetics -- Aesthetics (Socialist) -- Affect -- Age -- Aged, Immiseration of -- Age Grades -- Agency, Human -- Agitation -- Agnosticism -- Agrarian Society -- Agriculture -- Agriculture, Hydraulic Societies -- Agrippa -- Ahistoricism -- Algorithm -- Alienation -- Alienation, Assumptions of -- Alienation, Psychological -- Allegory -- Analogy -- Analysis -- Anarchy -- Androcentricism -- Animal Functions -- Anomia -- Anomie -- Anthropocentrism -- Anthropology -- Anthropomorphism -- Anti-Foundationalism -- Anti-Semitism -- Apathy -- Apollonian -- Apology -- Apple, and Temptation to Knowledge -- Appropriation -- Appropriation, Mechanisms of -- Aquinas, Thomas, St. (1225-1274) -- Archaeology -- Archetype -- Aristocracy -- Aristotle (384-322 B.C.E.) -- Art -- Artificial Intelligence -- Artificial Stupidity -- Asceticism -- Ascribed Status -- Ashby's Law of Requisite Variety -- Assimilation -- Atheism -- Attitude -- Attractor -- Attractor, Strange -- Augustine, St. (354-430) -- Author -- Authoritarianism -- Authoritarian Personality -- Authority -- Automation -- Autonomy -- Away(s) -- Axiology -- Axiom -- B -- Back Stage -- Bacon, Francis (1561-1626) -- Bakunin, Mikhail (1814-1876) -- Balance of Payments -- Balance of Trade -- Banditry, Social -- Barbarism -- Barthes, Roland (1915-1980) -- Base -- Baseball -- Base Communities -- Bastard -- Baudrillard, Jean (1929- ) -- Beauvoir, Simone de (1908-1986) -- Behavior -- Behaviorism -- Behavior Modification -- Belief.…”
    Full text (MFA users only)
    Electronic eBook
  8. 688

    The structure of amorphous materials using molecular dynamics by Massobrio, C. (Carlo)

    Published 2023
    Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
    Full text (MFA users only)
    Electronic eBook
  9. 689
  10. 690
  11. 691

    Statistical learning from a regression perspective by Berk, Richard A.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  12. 692

    Security, Privacy and Reliability in Computer Communications and Networks. by Sha, Kewei

    Published 2016
    Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
    Full text (MFA users only)
    Electronic eBook
  13. 693

    Uncommon sense : investment wisdom since the stock market's dawn by Kemp, Michael E.

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  14. 694

    Power system wide-area stability analysis and control by Ma, Jing (Electrical engineer)

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  15. 695
  16. 696

    Essential principles for autonomous robotics by Hexmoor, Henry, 1960-

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  17. 697

    Computer aided design and manufacturing by Bi, Zhuming, Wang, Xiaoqin (Writer on manufacturing)

    Published 2020
    Table of Contents: “…Evaluate Platform Solutions 159; 4.11 Computer Aided Tools (CAD) for Platform Technologies 160; 4.11.1 Modelling Techniques of Product Variants 163; 4.11.2 Design Toolboxes 163; 4.11.3 Custom Design Libraries 164; 4.12 Summary 165; 4.13 Design Projects 166; References 169; 5 Computer Aided Reverse Engineering 173; 5.1 Introduction 173; 5.2 RE as Design Methodology 175; 5.3 RE Procedure 178; 5.4 Digital Modelling 179; 5.4.1 Types of Digital Models 180; 5.4.2 Surface Reconstruction 181; 5.4.3 Algorithms for Surface Reconstruction 181; 5.4.4 Limitations of Existing Algorithms 182; 5.4.5 Data Flow in Surface Reconstruction 183; 5.4.6 Surface Reconstruction Algorithm 184; 5.4.7 Implementation Examples 186; 5.5 Hardware Systems for Data Acquisition 188; 5.5.1 Classification of Hardware Systems 191; 5.5.2 Positioning of Data Acquisition Devices 197; 5.5.3 Control of Scanning Processes 199; 5.5.4 Available Hardware Systems 200; 5.6 Software Systems for Data Processing 201; 5.6.1 Data Filtering 201; 5.6.2 Data Registration and Integration 204; 5.6.3 Feature Detection 205; 5.6.4 Surface Reconstruction 205; 5.6.5 Surface Simplification 205; 5.6.6 Segmentation 206; 5.6.7 Available Software Tools 206; 5.7 Typical Manufacturing Applications 206; 5.8 Computer Aided Reverse Engineering (CARE) 208; 5.8.1 Recap to Convert Sensed Data into Polygonal Models 209; 5.8.2 ScanTo3D for Generation of Parametric Models 211; 5.8.3 RE of Assembled Products 212; 5.9 RE -- Trend of Development 213; 5.10 Summary 213; 5.11 Design Project 214; References 215; 6 Computer Aided Machine Design 219; 6.1 Introduction 219; 6.2 General Functional Requirements (FRs) of Machines 222; 6.3 Fundamentals of Machine Design 223; 6.3.1 Link Types 223; 6.3.2 Joint Types and Degrees of Freedom (DoFs) 223; 6.3.3 Kinematic Chains 225; 6.3.4 Mobility of Mechanical Systems 226; 6.4 Kinematic Synthesis 230; 6.4.1 Type Synthesis 230; 6.4.2 Number Synthesis 230; 6.4.3 Dimensional Synthesis 232; 6.5 Kinematics 233; 6.5.1 Positions of Particles, Links, and Bodies in 2D and 3D Space 233; 6.5.2 Motions of Particles, Links, and Bodies 235; 6.5.3 Vector-Loop Method for Motion Analysis of a Plane Mechanism 240; 6.5.4 Kinematic Modelling Based on Denavit-Hartenberg (D-H) Parameters 246; 6.5.5 Jacobian Matrix for Velocity Relations 248; 6.6 Dynamic Modelling 259; 6.6.1 Inertia and Moments of Inertia 259; 6.6.2 Newton-Euler Formulation 261; 6.6.3 Lagrangian Method 266; 6.7 Kinematic and Dynamics Modelling in Virtual Design 269; 6.7.1 Motion Simulation 269; 6.7.2 Model Preparation 271; 6.7.3 Creation of a Simulation Model 271; 6.7.4 Define Motion Variables 274; 6.7.5 Setting Simulation Parameters 275; 6.7.6 Run Simulation and Visualize Motion 275; 6.7.7 Analyse Simulation Data 276; 6.7.8 Structural Simulation Using Motion Loads 277; 6.8 Summary 278; 6.9 Design Project 279; References 279; Part II Computer Aided Manufacturing (CAM) 281; 7 Group Technology and Cellular Manufacturing 283; 7.1 Introduction 283; 7.2 Manufacturing System and Components 2…”
    Full text (MFA users only)
    Electronic eBook
  18. 698

    NGN architectures, protocols, and services by Janevski, Toni

    Published 2014
    Table of Contents: “…1.7 The Convergence of the Two Worlds: Next Generation Networks1.7.1 NGN Perspective of Telecom Operators; 1.7.2 When Will NGN Emerge?; 1.8 The Structure of This Book; References; Chapter 2 Internet Fundamentals by IETF; 2.1 Internet Architecture and IETF Standardization; 2.2 Fundamental Internet Protocols; 2.2.1 Internet Protocol Version 4; 2.2.2 Internet Protocol Version 6; 2.2.3 User Datagram Protocol; 2.2.4 Transmission Control Protocol; 2.2.5 Stream Control Transmission Protocol; 2.3 Addressing and Numbering; 2.3.1 IPv4 Addressing; 2.3.2 Network Address Translation.…”
    Full text (MFA users only)
    Electronic eBook
  19. 699

    Qualitative Spatial and Temporal Reasoning. by Ligozat, Gérard

    Published 2012
    Table of Contents: “…Generalized Intervals; 3.1. "When they built the bridge."…”
    Full text (MFA users only)
    Electronic eBook
  20. 700

    Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now

    Published 2005
    Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook