Search Results - (((((((kent OR want) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 42
- Artificial intelligence 40
- Machine learning 35
- Mathematics 28
- Mathematical models 25
- artificial intelligence 25
- Data mining 24
- Algorithms 23
- algorithms 22
- Technological innovations 19
- Computer networks 18
- methods 18
- Artificial Intelligence 17
- Computer algorithms 17
- Application software 16
- Development 16
- Python (Computer program language) 15
- Social aspects 15
- Big data 14
- Data Mining 14
- Information technology 13
- Management 13
- Mathematical optimization 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- History 10
- Computer science 9
- Computer simulation 9
- Diseases 9
Search alternatives:
- kent »
-
621
Spread spectrum systems for GNSS and wireless communications
Published 2007Table of Contents: “…4.3.1 Convolutional Code Encoder Characterization -- 4.3.2 The Transfer Function of a Convolutional Code and the Free Distance -- 4.3.3 Decoding of Convolutional Codes -- 4.3.4 The Viterbi Algorithm -- 4.3.5 Error Probabilities for Viterbi Decoding of Convolutional Codes -- 4.3.6 Sequential Decoding of Convolutional Codes -- 4.3.7 Threshold Decoding of Convolutional Codes -- 4.3.8 Nonbinary Convolutional Codes -- 4.4 ITERATIVELY DECODED CODES -- 4.4.1 Turbo Codes -- 4.4.2 A Serial Concatenated Convolutional Code -- 4.4.3 Serial Concatenated Block Codes -- 4.4.4 Parallel Concatenated Block Codes -- 4.4.5 Low-Density Parity Check Codes -- 4.5 SELECTED RESULTS FOR SOME ERROR CORRECTION CODES -- 4.5.1 Bose, Chaudhuri, and Hocquenghem Codes -- 4.5.2 Reed-Solomon Codes -- 4.5.3 Convolutional Codes with Maximum Free Distance -- 4.5.4 Hard- and Soft-Decision FFH/MFSK with Repeat Coding BER Performance -- 4.6 SHANNON'S CAPACITY THEOREM, THE CHANNEL CODING THEOREM, AND BANDWIDTH EFFICIENCY -- 4.6.1 Shannon's Capacity Theorem -- 4.6.2 Channel Coding Theorem -- 4.6.3 Bandwidth Efficiency -- 4.7 APPLICATIONS OF ERROR CONTROL CODING -- 4.8 SUMMARY -- References -- Selected Bibliography -- Problems -- CHAPTER 5 Carrier Tracking Loops and Frequency Synthesizers -- 5.0 INTRODUCTION -- 5.1 TRACKING OF RESIDUAL CARRIER SIGNALS -- 5.2 PLL FOR TRACKING A RESIDUAL CARRIER COMPONENT -- 5.2.1 The Likelihood Function for Phase Estimation -- 5.2.2 The Maximum-Likelihood Estimation of Carrier Phase -- 5.2.3 Long Loops and Short Loops -- 5.2.4 The Stochastic Differential Equation of Operation -- 5.2.5 The Linear Model of the PLL with Noise -- 5.2.6 The Various Loop Filter Types -- 5.2.7 Transient Response of a Second-Order Loop -- 5.2.8 Steady State Tracking Error When the Phase Error Is Small -- 5.2.9 The Variance of the Linearized PLL Phase Error Due to Thermal Noise.…”
Full text (MFA users only)
Electronic eBook -
622
Liquid surfaces and interfaces : synchrotron X-ray methods
Published 2012Full text (MFA users only)
Electronic eBook -
623
PID and predictive control of electrical drives and power supplies using MATLAB/Simulink
Published 2015Full text (MFA users only)
Electronic eBook -
624
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
Full text (MFA users only)
Electronic eBook -
625
-
626
Systemic architecture : operating manual for the self-organizing city
Published 2012Full text (MFA users only)
Electronic eBook -
627
Dynamics among nations : the evolution of legitimacy and development in modern states
Published 2013Full text (MFA users only)
Electronic eBook -
628
Teaching primary programming with Scratch : research-informed approaches. Teacher book
Published 2022Full text (MFA users only)
Electronic eBook -
629