Search Results - (((((((kent OR want) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

  1. 561

    Security, Privacy and Reliability in Computer Communications and Networks. by Sha, Kewei

    Published 2016
    Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
    Full text (MFA users only)
    Electronic eBook
  2. 562

    SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention. by Almalawi, Abdulmohsen

    Published 2020
    Table of Contents: “…CHAPTER 4 Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- 4.1 INTRODUCTION -- 4.2 RELATED WORK -- 4.3 THE kNNVWC APPROACH -- 4.3.1 FWC Algorithm and Its Limitations -- 4.3.2 Various-Widths Clustering -- 4.3.3 The k-NN Search -- 4.4 EXPERIMENTAL EVALUATION -- 4.4.1 Data Sets -- 4.4.2 Performance Metrics -- 4.4.3 Impact of Cluster Size -- 4.4.4 Baseline Methods -- 4.4.5 Distance Metric -- 4.4.6 Complexity Metrics -- 4.5 CONCLUSION -- CHAPTER 5 SCADA Data-Driven Anomaly Detection -- 5.1 INTRODUCTION -- 5.2 SDAD APPROACH -- 5.2.1 Observation State of SCADA Points…”
    Full text (MFA users only)
    Electronic eBook
  3. 563

    NGN architectures, protocols, and services by Janevski, Toni

    Published 2014
    Table of Contents: “…1.7 The Convergence of the Two Worlds: Next Generation Networks1.7.1 NGN Perspective of Telecom Operators; 1.7.2 When Will NGN Emerge?; 1.8 The Structure of This Book; References; Chapter 2 Internet Fundamentals by IETF; 2.1 Internet Architecture and IETF Standardization; 2.2 Fundamental Internet Protocols; 2.2.1 Internet Protocol Version 4; 2.2.2 Internet Protocol Version 6; 2.2.3 User Datagram Protocol; 2.2.4 Transmission Control Protocol; 2.2.5 Stream Control Transmission Protocol; 2.3 Addressing and Numbering; 2.3.1 IPv4 Addressing; 2.3.2 Network Address Translation.…”
    Full text (MFA users only)
    Electronic eBook
  4. 564

    Qualitative Spatial and Temporal Reasoning. by Ligozat, Gérard

    Published 2012
    Table of Contents: “…Generalized Intervals; 3.1. "When they built the bridge."…”
    Full text (MFA users only)
    Electronic eBook
  5. 565

    Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now

    Published 2005
    Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 566

    Anesthesia student survival guide : a case-based approach

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  7. 567
  8. 568

    CCNA Security Study Guide : Exam 210-260. by McMillan, Troy

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  9. 569
  10. 570

    The illustrated network : how TCP/IP works in a modern network by Goralski, Walter

    Published 2017
    Table of Contents: “…Example ARP Operation -- ARP Variations -- Proxy ARP -- Reverse ARP -- ARPs on WANs -- ARP and IPv6 -- Neighbor Discovery Protocol -- ND Address Resolution -- Questions for Readers -- 7 IPv4 and IPv6 Headers -- Packet Headers and Addresses -- The IPv4 Packet Header -- Fragmentation and IPv4 -- Fragmentation and MTU -- Fragmentation and Reassembly -- Path MTU Determination -- A Fragmentation Example -- Limitations of IPv4 -- The IPv6 Header Structure -- IPv4 and IPv6 Headers Compared -- IPv6 Header Changes -- IPv6 and Fragmentation -- Questions for Readers -- 8 Internet Control Message Protocol -- ICMP and Ping -- The ICMP Message Format -- ICMP Message Fields -- ICMP Types and Codes -- ICMP Error Messages -- ICMP Query Messages -- Other ICMP Messages -- Sending ICMP Messages -- When ICMP Must Be Sent -- When ICMP Must Not Be Sent -- Ping -- Traceroute -- Path MTU -- ICMPv6 -- Basic ICMPv6 Messages -- Destination Unreachable -- Packet Too Big -- Time Exceeded -- Parameter Problem -- Echo Request and Reply -- Neighbor Discovery and Autoconfiguration -- Routers and Neighbor Discovery -- Interface Addresses -- Neighbor Solicitation and Advertisement -- Questions for Readers -- 9 Routing -- Routers and Routing Tables -- Hosts and Routing Tables -- Direct and Indirect Delivery -- Routing -- Direct Delivery without Routing -- Indirect Delivery and the Router -- Questions for Readers -- 10 Forwarding IP Packets -- Router Architectures -- Basic Router Architectures -- Another Router Architecture -- Router Access -- The Console Port -- The Auxiliary Port -- The Network -- Forwarding Table Lookups -- Dual Stacks, Tunneling, and IPv6 -- Dual Protocol Stacks -- Tunneling -- Tunneling Mechanisms -- Transition Considerations -- Questions for Readers -- 11 User Datagram Protocol -- UDP Ports and Sockets -- What UDP Is For -- The UDP Header -- IPv4 and IPv6 Notes.…”
    Full text (MFA users only)
    Electronic eBook
  11. 571

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
    Book
  12. 572
  13. 573
  14. 574
  15. 575

    Big data : concepts, technology and architecture by Balusamy, Balamurugan, R, Nandhini Abirami, Kadry, Seifedine, 1977-, Gandomi, Amir Hossein

    Published 2021
    Table of Contents: “…<i>3</i>Big Data Analytics. 31</p> <p>1.7.4 Visualizing Big Data. 32</p> <p>1.8 Big Data Technology. 32</p> <p>1.8.1 Challenges faced by Big Data technology. 34</p> <p>1.8.1 Heterogeneity and incompleteness. 34</p> <p>1.8.2 Volume and velocity of the Data. 35</p> <p>1.8.3 Data Storage. 35</p> <p>1.8.4 Data Privacy. 36</p> <p>1.9 Big Data Applications. 36</p> <p>1.10 Big Data Use Cases. 37</p> <p>1.9. 1 Healthcare. 37</p> <p>1.9.2 Telecom.. 38</p> <p>1.9.3 Financial Services. 39</p> <p>Chapter 1 refresher: 40</p> <p>Conceptual short Questions with answers. 43</p> <p>Frequently asked Interview questions. 45</p> <p>Chapter Objective. 46</p> <p>Big Data Storage Concepts. 46</p> <p>2.1 Cluster computing. 47</p> <p>2.1.1 Types of cluster. 49</p> <p>2.1.1.1 High availability cluster. 50</p> <p>2.1.1.2 Load balancing cluster. 50</p> <p>2.1.2 Cluster structure. 51</p> <p>2.3 Distribution Models. 53</p> <p>2.3.1 Sharding. 54</p> <p>2.3.2 Data Replication. 56</p> <p>2.3.2.1 Master-Slave model 57</p> <p>2.3.2.2 Peer-to-Peer model 58</p> <p>2.3.3 Sharding and Replication. 59</p> <p>2.4 Distributed file system.. 60</p> <p>2.5 Relational and Non Relational Databases. 61</p> <p>CoursesOffered. 62</p> <p>Figure 2.12 Data divided across multiple related tables. 62</p> <p>2.4.2 RDBMS Databases. 63</p> <p>2.4.3 NoSQL Databases. 63</p> <p>2.4.4 NewSQL Databases. 64</p> <p>2.5 Scaling Up and Scaling Out Storage. 65</p> <p>Chapter 2 refresher. 67</p> <p>Conceptual short questions with answers. 69</p> <p>Chapter Objective. 72</p> <p>3.1 Introduction to NoSQL. 72</p> <p>3.2 Why NoSQL. 72</p> <p>3.3 CAP theorem.. 73</p> <p>3.4 ACID.. 75</p> <p>3.5 BASE. 76</p> <p>3.6 Schemaless Database. 77</p> <p>3.7 NoSQL (Not Only SQL) 77</p> <p>3.7.1 NoSQL Vs RDBMS. 78</p> <p>3.7.2Features of NoSQL database. 79</p> <p>3.7.3Types of NoSQL Technologies. 80</p> <p>3.7.3.1 Key-Value store database. 81</p> <p>3.7.3.2 Column-store database. 82</p> <p>3.7.3.3 Document Oriented Database. 84</p> <p>3.7.3.4 Graph-oriented Database. 86</p> <p>3.7.4 NoSQL Operations. 93</p> <p>3.9 Migrating from RDBMS to NoSQL. 98</p> <p>Chapter 3 refresher. 99</p> <p>Conceptual short questions with answers. 102</p> <p>Chapter Objective. 104</p> <p>4.1 Data Processing. 104</p> <p>4.2 Shared Everything Architecture. 106</p> <p>4.2.1 Symmetric multiprocessing architecture. 107</p> <p>4.2.2 Distributed Shared memory. 108</p> <p>4.3 Shared nothing architecture. 109</p> <p>4.4 Batch Processing. 110</p> <p>4.5 Real-Time Data Processing. 111</p> <p>4.6 Parallel Computing. 112</p> <p>4.7 Distributed Computing. 113</p> <p>4.8 Big Data Virtualization. 113</p> <p>4.8.1 Attributes of Virtualization. 114</p> <p>4.8.1.1 Encapsulation. 115</p> <p>4.8.1.2 Partitioning. 115</p> <p>4.8.1.3 Isolation. 115</p> <p>4.8.2Big Data Server Virtualization. 116</p> <p>4.9 Introduction. 116</p> <p>4.10 Cloud computing types. 118</p> <p>4.11Cloud Services. 120</p> <p>4.12 Cloud Storage. 121</p> <p>4.12.1 Architecture of GFS. 121</p> <p>4.12.1.1 Master. 123</p> <p>4.12.1.2 Client. 123</p> <p>4.13 Cloud Architecture. 127</p> <p>Cloud Challenges. 129</p> <p>Chapter 4 Refresher. 130</p> <p>Conceptual short questions with answers. 133</p> <p>Chapter Objective. 139</p> <p>5.1 Apache Hadoop. 139</p> <p>5.1.1 Architecture of Apache Hadoop. 140</p> <p>5.1.2Hadoop Ecosystem Components Overview.. 140</p> <p>5.2 Hadoop Storage. 142</p> <p>5.2.1HDFS (Hadoop Distributed File System). 142</p> <p>5.2.2Why HDFS?. …”
    Full text (MFA users only)
    Electronic eBook
  16. 576
  17. 577
  18. 578

    An Update on Airway Management

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  19. 579

    Analyzing neural time series data : theory and practice by Cohen, Mike X., 1979-

    Published 2014
    Table of Contents: “…Which Sampling Rate to Use When Recording Data -- 6.7. Other Optional Equipment to Consider -- pt. …”
    Full text (MFA users only)
    Electronic eBook
  20. 580

    COST ANALYSIS OF ELECTRONIC SYSTEMS. by Sandborn, Peter

    Published 2012
    Table of Contents: “…5.2.1 Traditional cost accounting (TCA)5.2.2 Activity-based costing; 5.3 Activity-Based Cost Model Example; 5.4 Summary and Discussion; References; Bibliography; Problems; Chapter 6 Parametric Cost Modeling; 6.1 Cost Estimating Relationships (CERs); 6.1.1 Developing CERs; 6.2 A Simple Parametric Cost Modeling Example; 6.3 Limitations of CERs; 6.3.1 Bounds of the data; 6.3.2 Scope of the data; 6.3.3 Overfitting; 6.3.4 Don't force a correlation when one does not exist; 6.3.5 Historical data; 6.4 Other Parametric Cost Modeling/Estimation Approaches; 6.4.1 Feature-based costing (FBC).…”
    Full text (MFA users only)
    Electronic eBook