Search Results - (((((((kant OR want) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 60
- Artificial intelligence 55
- Mathematics 41
- Machine learning 38
- Mathematical models 36
- Data mining 29
- artificial intelligence 28
- Algorithms 25
- Technological innovations 22
- Artificial Intelligence 21
- algorithms 21
- Social aspects 20
- Computer networks 18
- Python (Computer program language) 18
- Mathematical optimization 17
- methods 17
- Data Mining 16
- History 16
- Big data 15
- Application software 14
- Computer algorithms 14
- Computer science 14
- Development 14
- Image processing 13
- Statistical methods 13
- Digital techniques 12
- Information technology 12
- Neural networks (Computer science) 12
- Research 12
- Engineering 11
Search alternatives:
- kant »
-
701
The method of the generalised eikonal : new approaches in the Diffraction Theory.
Published 2015Full text (MFA users only)
Electronic eBook -
702
Security, Privacy and Reliability in Computer Communications and Networks.
Published 2016Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
Full text (MFA users only)
Electronic eBook -
703
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Full text (MFA users only)
Electronic eBook -
704
Power system wide-area stability analysis and control
Published 2018Full text (MFA users only)
Electronic eBook -
705
The internet of things and big data analytics integrated platforms and industry use cases
Published 2020Full text (MFA users only)
Electronic eBook -
706
IP multicast with applications to IPTV and mobile DVB-H
Published 2008Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
Full text (MFA users only)
Electronic eBook -
707
-
708
Essential principles for autonomous robotics
Published 2013Full text (MFA users only)
Electronic eBook -
709
Computer aided design and manufacturing
Published 2020Table of Contents: “…Evaluate Platform Solutions 159; 4.11 Computer Aided Tools (CAD) for Platform Technologies 160; 4.11.1 Modelling Techniques of Product Variants 163; 4.11.2 Design Toolboxes 163; 4.11.3 Custom Design Libraries 164; 4.12 Summary 165; 4.13 Design Projects 166; References 169; 5 Computer Aided Reverse Engineering 173; 5.1 Introduction 173; 5.2 RE as Design Methodology 175; 5.3 RE Procedure 178; 5.4 Digital Modelling 179; 5.4.1 Types of Digital Models 180; 5.4.2 Surface Reconstruction 181; 5.4.3 Algorithms for Surface Reconstruction 181; 5.4.4 Limitations of Existing Algorithms 182; 5.4.5 Data Flow in Surface Reconstruction 183; 5.4.6 Surface Reconstruction Algorithm 184; 5.4.7 Implementation Examples 186; 5.5 Hardware Systems for Data Acquisition 188; 5.5.1 Classification of Hardware Systems 191; 5.5.2 Positioning of Data Acquisition Devices 197; 5.5.3 Control of Scanning Processes 199; 5.5.4 Available Hardware Systems 200; 5.6 Software Systems for Data Processing 201; 5.6.1 Data Filtering 201; 5.6.2 Data Registration and Integration 204; 5.6.3 Feature Detection 205; 5.6.4 Surface Reconstruction 205; 5.6.5 Surface Simplification 205; 5.6.6 Segmentation 206; 5.6.7 Available Software Tools 206; 5.7 Typical Manufacturing Applications 206; 5.8 Computer Aided Reverse Engineering (CARE) 208; 5.8.1 Recap to Convert Sensed Data into Polygonal Models 209; 5.8.2 ScanTo3D for Generation of Parametric Models 211; 5.8.3 RE of Assembled Products 212; 5.9 RE -- Trend of Development 213; 5.10 Summary 213; 5.11 Design Project 214; References 215; 6 Computer Aided Machine Design 219; 6.1 Introduction 219; 6.2 General Functional Requirements (FRs) of Machines 222; 6.3 Fundamentals of Machine Design 223; 6.3.1 Link Types 223; 6.3.2 Joint Types and Degrees of Freedom (DoFs) 223; 6.3.3 Kinematic Chains 225; 6.3.4 Mobility of Mechanical Systems 226; 6.4 Kinematic Synthesis 230; 6.4.1 Type Synthesis 230; 6.4.2 Number Synthesis 230; 6.4.3 Dimensional Synthesis 232; 6.5 Kinematics 233; 6.5.1 Positions of Particles, Links, and Bodies in 2D and 3D Space 233; 6.5.2 Motions of Particles, Links, and Bodies 235; 6.5.3 Vector-Loop Method for Motion Analysis of a Plane Mechanism 240; 6.5.4 Kinematic Modelling Based on Denavit-Hartenberg (D-H) Parameters 246; 6.5.5 Jacobian Matrix for Velocity Relations 248; 6.6 Dynamic Modelling 259; 6.6.1 Inertia and Moments of Inertia 259; 6.6.2 Newton-Euler Formulation 261; 6.6.3 Lagrangian Method 266; 6.7 Kinematic and Dynamics Modelling in Virtual Design 269; 6.7.1 Motion Simulation 269; 6.7.2 Model Preparation 271; 6.7.3 Creation of a Simulation Model 271; 6.7.4 Define Motion Variables 274; 6.7.5 Setting Simulation Parameters 275; 6.7.6 Run Simulation and Visualize Motion 275; 6.7.7 Analyse Simulation Data 276; 6.7.8 Structural Simulation Using Motion Loads 277; 6.8 Summary 278; 6.9 Design Project 279; References 279; Part II Computer Aided Manufacturing (CAM) 281; 7 Group Technology and Cellular Manufacturing 283; 7.1 Introduction 283; 7.2 Manufacturing System and Components 2…”
Full text (MFA users only)
Electronic eBook -
710
NGN architectures, protocols, and services
Published 2014Table of Contents: “…1.7 The Convergence of the Two Worlds: Next Generation Networks1.7.1 NGN Perspective of Telecom Operators; 1.7.2 When Will NGN Emerge?; 1.8 The Structure of This Book; References; Chapter 2 Internet Fundamentals by IETF; 2.1 Internet Architecture and IETF Standardization; 2.2 Fundamental Internet Protocols; 2.2.1 Internet Protocol Version 4; 2.2.2 Internet Protocol Version 6; 2.2.3 User Datagram Protocol; 2.2.4 Transmission Control Protocol; 2.2.5 Stream Control Transmission Protocol; 2.3 Addressing and Numbering; 2.3.1 IPv4 Addressing; 2.3.2 Network Address Translation.…”
Full text (MFA users only)
Electronic eBook -
711
Qualitative Spatial and Temporal Reasoning.
Published 2012Table of Contents: “…Generalized Intervals; 3.1. "When they built the bridge."…”
Full text (MFA users only)
Electronic eBook -
712
Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now
Published 2005Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
713
Anesthesia student survival guide : a case-based approach
Published 2016Full text (MFA users only)
Electronic eBook -
714
Scala Machine Learning Projects : Build real-world machine learning and deep learning projects with Scala.
Published 2018Full text (MFA users only)
Electronic eBook -
715
Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics
Published 2020Table of Contents: “…5.5.2 Survivability, Availability, and Reliability 122 -- 5.6 Sovereignty, Privacy, Security, Interoperability, and Management 123 -- 5.6.1 Data Sovereignty 123 -- 5.6.2 Privacy and Security 123 -- 5.6.3 Heterogeneity and Interoperability 124 -- 5.6.4 Monitoring, Orchestration, and Management 124 -- 5.7 Trade-Offs 125 -- 5.8 Conclusion 126 -- References 126 -- 6 Incentive Schemes for User-Provided Fog Infrastructure 129 /George Iosifidis, Lin Gao, Jianwei Huang, and Leandros Tassiulas -- 6.1 Introduction 129 -- 6.2 Technology and Economic Issues in UPIs 132 -- 6.2.1 Overview of UPI models for Network Connectivity 132 -- 6.2.2 Technical Challenges of Resource Allocation 134 -- 6.2.3 Incentive Issues 135 -- 6.3 Incentive Mechanisms for Autonomous Mobile UPIs 137 -- 6.4 Incentive Mechanisms for Provider-assisted Mobile UPIs 140 -- 6.5 Incentive Mechanisms for Large-Scale Systems 143 -- 6.6 Open Challenges in Mobile UPI Incentive Mechanisms 145 -- 6.6.1 Autonomous Mobile UPIs 145 -- 6.6.1.1 Consensus of the Service Provider 145 -- 6.6.1.2 Dynamic Setting 146 -- 6.6.2 Provider-assisted Mobile UPIs 146 -- 6.6.2.1 Modeling the Users 146 -- 6.6.2.2 Incomplete Market Information 147 -- 6.7 Conclusions 147 -- References 148 -- 7 Fog-Based Service Enablement Architecture 151 /Nanxi Chen, Siobhán Clarke, and Shu Chen -- 7.1 Introduction 151 -- 7.1.1 Objectives and Challenges 152 -- 7.2 Ongoing Effort on FogSEA 153 -- 7.2.1 FogSEA Service Description 156 -- 7.2.2 Semantic Data Dependency Overlay Network 158 -- 7.2.2.1 Creation and Maintenance 159 -- 7.2.2.2 Semantic-Based Service Matchmarking 161 -- 7.3 Early Results 164 -- 7.3.1 Service Composition 165 -- 7.3.1.1 SeDDON Creation in FogSEA 167 -- 7.3.2 Related Work 168 -- 7.3.2.1 Semantic-Based Service Overlays 169 -- 7.3.2.2 Goal-Driven Planning 170 -- 7.3.2.3 Service Discovery 171 -- 7.3.3 Open Issue and Future Work 172 -- References 174 -- 8 Software-Defined Fog Orchestration for IoT Services 179 /Renyu Yang, Zhenyu Wen, David McKee, Tao Lin, Jie Xu, and Peter Garraghan.…”
Full text (MFA users only)
Electronic eBook -
716
CCNA Security Study Guide : Exam 210-260.
Published 2018Full text (MFA users only)
Electronic eBook -
717
At a distance : precursors to art and activism on the Internet
Published 2005Full text (MFA users only)
Electronic eBook -
718
The illustrated network : how TCP/IP works in a modern network
Published 2017Table of Contents: “…Example ARP Operation -- ARP Variations -- Proxy ARP -- Reverse ARP -- ARPs on WANs -- ARP and IPv6 -- Neighbor Discovery Protocol -- ND Address Resolution -- Questions for Readers -- 7 IPv4 and IPv6 Headers -- Packet Headers and Addresses -- The IPv4 Packet Header -- Fragmentation and IPv4 -- Fragmentation and MTU -- Fragmentation and Reassembly -- Path MTU Determination -- A Fragmentation Example -- Limitations of IPv4 -- The IPv6 Header Structure -- IPv4 and IPv6 Headers Compared -- IPv6 Header Changes -- IPv6 and Fragmentation -- Questions for Readers -- 8 Internet Control Message Protocol -- ICMP and Ping -- The ICMP Message Format -- ICMP Message Fields -- ICMP Types and Codes -- ICMP Error Messages -- ICMP Query Messages -- Other ICMP Messages -- Sending ICMP Messages -- When ICMP Must Be Sent -- When ICMP Must Not Be Sent -- Ping -- Traceroute -- Path MTU -- ICMPv6 -- Basic ICMPv6 Messages -- Destination Unreachable -- Packet Too Big -- Time Exceeded -- Parameter Problem -- Echo Request and Reply -- Neighbor Discovery and Autoconfiguration -- Routers and Neighbor Discovery -- Interface Addresses -- Neighbor Solicitation and Advertisement -- Questions for Readers -- 9 Routing -- Routers and Routing Tables -- Hosts and Routing Tables -- Direct and Indirect Delivery -- Routing -- Direct Delivery without Routing -- Indirect Delivery and the Router -- Questions for Readers -- 10 Forwarding IP Packets -- Router Architectures -- Basic Router Architectures -- Another Router Architecture -- Router Access -- The Console Port -- The Auxiliary Port -- The Network -- Forwarding Table Lookups -- Dual Stacks, Tunneling, and IPv6 -- Dual Protocol Stacks -- Tunneling -- Tunneling Mechanisms -- Transition Considerations -- Questions for Readers -- 11 User Datagram Protocol -- UDP Ports and Sockets -- What UDP Is For -- The UDP Header -- IPv4 and IPv6 Notes.…”
Full text (MFA users only)
Electronic eBook -
719
Hybrid systems, optimal control and hybrid vehicles : theory, methods and applications
Published 2017Full text (MFA users only)
Electronic eBook -
720
Nano-Biomedical Engineering 2009 : Proceedings of the Tohoku University Global Centre of Excellence Programme Global Nano-Biomedical Engineering Education and Research Network Cent...
Published 2009Table of Contents: “…Achievement of mechanical assistance by an artificial myocardium using shape memory alloy fibre / Yasuyuki Shiraishi, Tomoyuki Yambe, Dai Homma. …”
Full text (MFA users only)
Electronic eBook