Search Results - (((((((want OR when) OR semantic) OR arts) OR cantor) OR anne) OR wares) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 61
- Artificial intelligence 57
- Mathematical models 48
- Machine learning 44
- Mathematics 35
- Data mining 33
- artificial intelligence 32
- Artificial Intelligence 24
- Computer networks 23
- Algorithms 21
- Data Mining 20
- Mathematical optimization 20
- Python (Computer program language) 19
- Technological innovations 19
- algorithms 19
- Management 18
- methods 18
- Social aspects 17
- Big data 15
- Computer algorithms 15
- Computer science 15
- Computer simulation 15
- Security measures 15
- Development 14
- Diseases 14
- Electronic data processing 14
- History 14
- Information technology 14
- Philosophy 14
- Application software 13
Search alternatives:
- arts »
- mantis »
-
761
A Systems Approach to Lithium-Ion Battery Management.
Published 2013Table of Contents: “…1 Introduction -- 1.1 Battery Management Systems and Appli -- 1.2 State of the Art -- 1.3 Challenges -- 2 Lithium-Ion Battery Fundamentals -- 2.1 Battery Operation -- 2.2 Battery Construction -- 2.3 Battery Chemistry -- 2.4 Safety -- 2.5 Longevity -- 2.6 Performance -- 2.7 Integration -- 3 Large-Format Systems -- 3.1 Definition -- 3.2 Balance of Plant -- 3.3 Load Interface -- 3.4 Variation and Divergence -- 3.5 Application Parameters -- 4 System Description -- 4.1 Typical Inputs -- 4.2 Typical Outputs -- 4.3 Typical Functions -- 4.4 Summary -- 5 Architectures -- 5.1 Monolithic -- 5.2 Distributed -- 5.3 Semi-Distributed -- 5.4 Connection Methods -- 5.5 Additional Scalability -- 5.6 Battery Pack Architectures -- 5.7 Power Supply -- 5.8 Control Power -- 5.9 Computing Architecture -- 6 Measurement -- 6.1 Cell Voltage Measurement -- 6.2 Current Measurement -- 6.2.1 Current Sensors -- 6.2.2 Current Sense Measurement -- 6.3 Synchronization of Current and Volta -- 6.4 Temperature Measurement -- 6.5 Measurement Uncertainty and Battery -- 6.6 Interlock Status -- 7 Control -- 7.1 Contactor Control -- 7.2 Soft Start or Precharge Circuits -- 7.3 Control Topologies -- 7.4 Contactor Opening Transients -- 7.5 Chatter Detection -- 7.6 Economizers -- 7.7 Contactor Topologies -- 7.8 Contactor Fault Detection -- 8 Battery Management System Functionality -- 8.1 Charging Strategies -- 8.1.1 CC/CV Charging Method -- 8.1.2 Target Voltage Method -- 8.1.3 Constant Current Method -- 8.2 Thermal Management -- 8.3 Operational Modes -- 9 High-Voltage Electronics Fundamentals -- 9.1 High-Voltage DC Hazards -- 9.2 Safety of High-Voltage Electronics -- 9.3 Conductive Anodic Filaments -- 9.4 Floating Measurements -- 9.4.1 Y-Capacitance -- 9.5 HV Isolation -- 9.6 ESD Suppression on Isolated Devices -- 9.7 Isolation Detection -- 10 Communications -- 10.1 Overview.…”
Full text (MFA users only)
Electronic eBook -
762
The illustrated network : how TCP/IP works in a modern network
Published 2017Table of Contents: “…Example ARP Operation -- ARP Variations -- Proxy ARP -- Reverse ARP -- ARPs on WANs -- ARP and IPv6 -- Neighbor Discovery Protocol -- ND Address Resolution -- Questions for Readers -- 7 IPv4 and IPv6 Headers -- Packet Headers and Addresses -- The IPv4 Packet Header -- Fragmentation and IPv4 -- Fragmentation and MTU -- Fragmentation and Reassembly -- Path MTU Determination -- A Fragmentation Example -- Limitations of IPv4 -- The IPv6 Header Structure -- IPv4 and IPv6 Headers Compared -- IPv6 Header Changes -- IPv6 and Fragmentation -- Questions for Readers -- 8 Internet Control Message Protocol -- ICMP and Ping -- The ICMP Message Format -- ICMP Message Fields -- ICMP Types and Codes -- ICMP Error Messages -- ICMP Query Messages -- Other ICMP Messages -- Sending ICMP Messages -- When ICMP Must Be Sent -- When ICMP Must Not Be Sent -- Ping -- Traceroute -- Path MTU -- ICMPv6 -- Basic ICMPv6 Messages -- Destination Unreachable -- Packet Too Big -- Time Exceeded -- Parameter Problem -- Echo Request and Reply -- Neighbor Discovery and Autoconfiguration -- Routers and Neighbor Discovery -- Interface Addresses -- Neighbor Solicitation and Advertisement -- Questions for Readers -- 9 Routing -- Routers and Routing Tables -- Hosts and Routing Tables -- Direct and Indirect Delivery -- Routing -- Direct Delivery without Routing -- Indirect Delivery and the Router -- Questions for Readers -- 10 Forwarding IP Packets -- Router Architectures -- Basic Router Architectures -- Another Router Architecture -- Router Access -- The Console Port -- The Auxiliary Port -- The Network -- Forwarding Table Lookups -- Dual Stacks, Tunneling, and IPv6 -- Dual Protocol Stacks -- Tunneling -- Tunneling Mechanisms -- Transition Considerations -- Questions for Readers -- 11 User Datagram Protocol -- UDP Ports and Sockets -- What UDP Is For -- The UDP Header -- IPv4 and IPv6 Notes.…”
Full text (MFA users only)
Electronic eBook -
763
Advanced security solutions for multimedia
Published 2021Full text (MFA users only)
Electronic eBook -
764
Frontiers In The Study Of Chaotic Dynamical Systems With Open Problems.
Published 2011Table of Contents: “…Preface; Contents; Chapter 1 Problems with Lorenz's Modeling and the Algorithm of Chaos Doctrine; 1.1. Introduction; 1.2. …”
Full text (MFA users only)
Electronic eBook -
765
Multiscale Modeling In Solid Mechanics : Computational Approaches.
Published 2009Full text (MFA users only)
Electronic eBook -
766
Transitions from Digital Communications to Quantum Communications : Concepts and Prospects.
Published 2016Full text (MFA users only)
Electronic eBook -
767
Hybrid systems, optimal control and hybrid vehicles : theory, methods and applications
Published 2017Full text (MFA users only)
Electronic eBook -
768
Relationship inference with Familias and R : statistical methods in forensic genetics
Published 2016Full text (MFA users only)
Electronic eBook -
769
-
770
-
771
Future internet services and service architectures
Published 2011Full text (MFA users only)
Electronic eBook -
772
-
773
-
774
Military Operations Research : Quantitative Decision Making
Published 1997Full text (MFA users only)
Electronic eBook -
775
-
776
COST ANALYSIS OF ELECTRONIC SYSTEMS.
Published 2012Table of Contents: “…5.2.1 Traditional cost accounting (TCA)5.2.2 Activity-based costing; 5.3 Activity-Based Cost Model Example; 5.4 Summary and Discussion; References; Bibliography; Problems; Chapter 6 Parametric Cost Modeling; 6.1 Cost Estimating Relationships (CERs); 6.1.1 Developing CERs; 6.2 A Simple Parametric Cost Modeling Example; 6.3 Limitations of CERs; 6.3.1 Bounds of the data; 6.3.2 Scope of the data; 6.3.3 Overfitting; 6.3.4 Don't force a correlation when one does not exist; 6.3.5 Historical data; 6.4 Other Parametric Cost Modeling/Estimation Approaches; 6.4.1 Feature-based costing (FBC).…”
Full text (MFA users only)
Electronic eBook -
777
Cloud computing and virtualization
Published 2018Table of Contents: “…5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.…”
Full text (MFA users only)
Electronic eBook -
778
Yttrium : compounds, production and applications
Published 2011Table of Contents: “…Spot Size ; 4.4. Fluence ; 4.5. Algorithm ; 5. DEFINITION OF VASCULAR PATHOLOGY ; 6. …”
Full text (MFA users only)
Electronic eBook -
779
Coder to developer : tools and strategies for delivering your software
Published 2004Full text (MFA users only)
Electronic eBook -
780
RFID systems : research trends and challenges
Published 2010Full text (MFA users only)
Electronic eBook