Search Results - (((((((want OR when) OR semantic) OR arts) OR cantor) OR anne) OR wares) OR mantis) algorithms.

Search alternatives:

  1. 761

    A Systems Approach to Lithium-Ion Battery Management. by Weicker, Phil

    Published 2013
    Table of Contents: “…1 Introduction -- 1.1 Battery Management Systems and Appli -- 1.2 State of the Art -- 1.3 Challenges -- 2 Lithium-Ion Battery Fundamentals -- 2.1 Battery Operation -- 2.2 Battery Construction -- 2.3 Battery Chemistry -- 2.4 Safety -- 2.5 Longevity -- 2.6 Performance -- 2.7 Integration -- 3 Large-Format Systems -- 3.1 Definition -- 3.2 Balance of Plant -- 3.3 Load Interface -- 3.4 Variation and Divergence -- 3.5 Application Parameters -- 4 System Description -- 4.1 Typical Inputs -- 4.2 Typical Outputs -- 4.3 Typical Functions -- 4.4 Summary -- 5 Architectures -- 5.1 Monolithic -- 5.2 Distributed -- 5.3 Semi-Distributed -- 5.4 Connection Methods -- 5.5 Additional Scalability -- 5.6 Battery Pack Architectures -- 5.7 Power Supply -- 5.8 Control Power -- 5.9 Computing Architecture -- 6 Measurement -- 6.1 Cell Voltage Measurement -- 6.2 Current Measurement -- 6.2.1 Current Sensors -- 6.2.2 Current Sense Measurement -- 6.3 Synchronization of Current and Volta -- 6.4 Temperature Measurement -- 6.5 Measurement Uncertainty and Battery -- 6.6 Interlock Status -- 7 Control -- 7.1 Contactor Control -- 7.2 Soft Start or Precharge Circuits -- 7.3 Control Topologies -- 7.4 Contactor Opening Transients -- 7.5 Chatter Detection -- 7.6 Economizers -- 7.7 Contactor Topologies -- 7.8 Contactor Fault Detection -- 8 Battery Management System Functionality -- 8.1 Charging Strategies -- 8.1.1 CC/CV Charging Method -- 8.1.2 Target Voltage Method -- 8.1.3 Constant Current Method -- 8.2 Thermal Management -- 8.3 Operational Modes -- 9 High-Voltage Electronics Fundamentals -- 9.1 High-Voltage DC Hazards -- 9.2 Safety of High-Voltage Electronics -- 9.3 Conductive Anodic Filaments -- 9.4 Floating Measurements -- 9.4.1 Y-Capacitance -- 9.5 HV Isolation -- 9.6 ESD Suppression on Isolated Devices -- 9.7 Isolation Detection -- 10 Communications -- 10.1 Overview.…”
    Full text (MFA users only)
    Electronic eBook
  2. 762

    The illustrated network : how TCP/IP works in a modern network by Goralski, Walter

    Published 2017
    Table of Contents: “…Example ARP Operation -- ARP Variations -- Proxy ARP -- Reverse ARP -- ARPs on WANs -- ARP and IPv6 -- Neighbor Discovery Protocol -- ND Address Resolution -- Questions for Readers -- 7 IPv4 and IPv6 Headers -- Packet Headers and Addresses -- The IPv4 Packet Header -- Fragmentation and IPv4 -- Fragmentation and MTU -- Fragmentation and Reassembly -- Path MTU Determination -- A Fragmentation Example -- Limitations of IPv4 -- The IPv6 Header Structure -- IPv4 and IPv6 Headers Compared -- IPv6 Header Changes -- IPv6 and Fragmentation -- Questions for Readers -- 8 Internet Control Message Protocol -- ICMP and Ping -- The ICMP Message Format -- ICMP Message Fields -- ICMP Types and Codes -- ICMP Error Messages -- ICMP Query Messages -- Other ICMP Messages -- Sending ICMP Messages -- When ICMP Must Be Sent -- When ICMP Must Not Be Sent -- Ping -- Traceroute -- Path MTU -- ICMPv6 -- Basic ICMPv6 Messages -- Destination Unreachable -- Packet Too Big -- Time Exceeded -- Parameter Problem -- Echo Request and Reply -- Neighbor Discovery and Autoconfiguration -- Routers and Neighbor Discovery -- Interface Addresses -- Neighbor Solicitation and Advertisement -- Questions for Readers -- 9 Routing -- Routers and Routing Tables -- Hosts and Routing Tables -- Direct and Indirect Delivery -- Routing -- Direct Delivery without Routing -- Indirect Delivery and the Router -- Questions for Readers -- 10 Forwarding IP Packets -- Router Architectures -- Basic Router Architectures -- Another Router Architecture -- Router Access -- The Console Port -- The Auxiliary Port -- The Network -- Forwarding Table Lookups -- Dual Stacks, Tunneling, and IPv6 -- Dual Protocol Stacks -- Tunneling -- Tunneling Mechanisms -- Transition Considerations -- Questions for Readers -- 11 User Datagram Protocol -- UDP Ports and Sockets -- What UDP Is For -- The UDP Header -- IPv4 and IPv6 Notes.…”
    Full text (MFA users only)
    Electronic eBook
  3. 763

    Advanced security solutions for multimedia

    Published 2021
    Full text (MFA users only)
    Electronic eBook
  4. 764

    Frontiers In The Study Of Chaotic Dynamical Systems With Open Problems.

    Published 2011
    Table of Contents: “…Preface; Contents; Chapter 1 Problems with Lorenz's Modeling and the Algorithm of Chaos Doctrine; 1.1. Introduction; 1.2. …”
    Full text (MFA users only)
    Electronic eBook
  5. 765
  6. 766
  7. 767
  8. 768
  9. 769

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  10. 770

    Smart Embedded Systems and Applications. by Motahhir, Saad

    Published 2023
    Full text (MFA users only)
    Electronic eBook
  11. 771

    Future internet services and service architectures

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  12. 772

    Global logistics management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  13. 773

    An Update on Airway Management

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  14. 774
  15. 775

    New Techniques in Digital Holography

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  16. 776

    COST ANALYSIS OF ELECTRONIC SYSTEMS. by Sandborn, Peter

    Published 2012
    Table of Contents: “…5.2.1 Traditional cost accounting (TCA)5.2.2 Activity-based costing; 5.3 Activity-Based Cost Model Example; 5.4 Summary and Discussion; References; Bibliography; Problems; Chapter 6 Parametric Cost Modeling; 6.1 Cost Estimating Relationships (CERs); 6.1.1 Developing CERs; 6.2 A Simple Parametric Cost Modeling Example; 6.3 Limitations of CERs; 6.3.1 Bounds of the data; 6.3.2 Scope of the data; 6.3.3 Overfitting; 6.3.4 Don't force a correlation when one does not exist; 6.3.5 Historical data; 6.4 Other Parametric Cost Modeling/Estimation Approaches; 6.4.1 Feature-based costing (FBC).…”
    Full text (MFA users only)
    Electronic eBook
  17. 777

    Cloud computing and virtualization

    Published 2018
    Table of Contents: “…5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.…”
    Full text (MFA users only)
    Electronic eBook
  18. 778

    Yttrium : compounds, production and applications

    Published 2011
    Table of Contents: “…Spot Size ; 4.4. Fluence ; 4.5. Algorithm ; 5. DEFINITION OF VASCULAR PATHOLOGY ; 6. …”
    Full text (MFA users only)
    Electronic eBook
  19. 779
  20. 780

    RFID systems : research trends and challenges

    Published 2010
    Full text (MFA users only)
    Electronic eBook