Search Results - (((((((want OR wantsi) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 681

    Analytics stories : using data to make good things happen by Winston, Wayne L.

    Published 2021
    Table of Contents: “…-- How much should we order and when should we order? -- How does the UPS driver know the order to deliver packages? …”
    Full text (MFA users only)
    Electronic eBook
  2. 682
  3. 683

    A Hands-On Guide to Designing Embedded Systems. by Taylor, Adam

    Published 2021
    Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
    Full text (MFA users only)
    Electronic eBook
  4. 684
  5. 685

    Vehicle Dynamics. by Meywerk, Martin

    Published 2015
    Table of Contents: “…11.4 Linearized Equations of Motion of the Single-track Model -- 11.5 Relationship between Longitudinal Forces and Lateral Forces in the Contact Patch -- 11.6 Effect of Differentials when Cornering -- 11.7 Questions and Exercises -- Chapter 12 Circular Driving at a Constant Speed -- 12.1 Equations -- 12.2 Solution of the Equations -- 12.3 Geometric Aspects -- 12.4 Oversteering and Understeering -- 12.5 Questions and Exercises -- Chapter 13 Dynamic Behaviour -- 13.1 Stability of Steady-state Driving Conditions -- 13.2 Steering Behaviour -- 13.3 Crosswind Behaviour -- 13.4 Questions and Exercises…”
    Full text (MFA users only)
    Electronic eBook
  6. 686

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  7. 687

    Handbook of convex optimization methods in imaging science

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  8. 688

    Cybersecurity Law, standards and regulations by Schreider, Tari

    Published 2020
    Table of Contents: “…Authors of original encryption algorithms never really thought that governments would want to have access to their en... -- In an effort to bring sanity to the uncontrolled growth of encryption regulations, two important laws have been introduced. …”
    Full text (MFA users only)
    Electronic eBook
  9. 689
  10. 690
  11. 691
  12. 692

    Data Analysis and Applications 1 : New and Classical Approaches. by Skiadas, Christos

    Published 2019
    Table of Contents: “…Similarity to homogeneous distributional shapes1.3.11. Stability; 1.3.12. Further Aspects; 1.4. …”
    Full text (MFA users only)
    Electronic eBook
  13. 693

    Advanced mathematical & computational tools in metrology & testing VIII

    Published 2009
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 694

    The structure of amorphous materials using molecular dynamics by Massobrio, C. (Carlo)

    Published 2023
    Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
    Full text (MFA users only)
    Electronic eBook
  15. 695
  16. 696
  17. 697

    Security, Privacy and Reliability in Computer Communications and Networks. by Sha, Kewei

    Published 2016
    Table of Contents: “…5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? …”
    Full text (MFA users only)
    Electronic eBook
  18. 698
  19. 699
  20. 700