Showing 142,361 - 142,380 results of 159,498 for search '(("klight" OR ((((("slight" OR "fight") OR "slightly") OR "flight") OR ((("fright" OR ((("wrights" OR "wrightss") OR "mights") OR "mights")) OR "night") OR ((("wrightss" OR ("weights" OR "weight")) OR ("rightss" OR "rights")) OR "heights"))) OR ("fightly" OR (((("wrightssly" OR "wrightly") OR ("frightsly" OR "wrightsly")) OR ("frightsssly" OR ("fightsssly" OR "lightsssly"))) OR ("rightssly" OR "rightsssly"))))) OR ("right" OR "light"))', query time: 1.72s Refine Results
  1. 142361

    Advances in Remote Sensing Technology and the Three Poles. by Pandey, Manish

    Newark : John Wiley & Sons, Incorporated, 2022
    Table of Contents: “…11.3.1 Sea Ice Variability in the Southern Ocean -- 11.3.2 Sea Ice Distribution With Respect to Ocean-Atmospheric Temperature -- 11.4 Summary and Conclusions -- Acknowledgments -- References -- Section III Himalayas: The Third Pole Environment and Remote Sensing -- 12 Some Unresolved Problems in the Himalaya: A Synoptic View -- 12.1 Introduction -- 12.2 Stratigraphic Ages, Basin Configuration, and Palaeontology -- 12.3 Sedimentology -- 12.4 Tectonics and Structure -- 12.5 Magmatism and Geochronology -- 12.6 Metamorphism -- 12.7 Mineral Deposits -- 12.8 Palaeomagnetic Studies -- 12.9 Glaciological Studies -- 12.10 Geomorphological Studies -- 12.11 Conclusion -- Acknowledgments -- References -- 13 Fluctuations of Kolahoi Glacier, Kashmir Valley, Its Assessment With Tree-Rings of Pinus wallichiana and Comparable Satellite Imageries and Field Survey Records -- 13.1 Introduction -- 13.2 Tree-Ring Sampling Site and Data Acquisition -- 13.3 Tree-Ring Chronology and Its Assessments -- 13.4 Fluctuations of Kolahoi Glacier: Existing Records and Its Assessment With Tree-Rings -- 13.5 Conclusions -- Acknowledgements -- References -- 14 Applications of ICESat-2 Photon Data in the Third Pole Environment -- 14.1 Introduction -- 14.2 Brief Background About NASA's ICESat-2 Mission -- 14.3 Terrain Profiling From ICESat-2 Photon Elevations Over a Mountainous Region -- 14.4 Longitudinal Profiling of Rivers in a Mountainous Region -- 14.5 Inland Water Level Detection in Mountainous Regions Using ICESat-2 Photon Data -- 14.6 Inferring Annual Variations of Water Levels in Mountain Lakes Using ICESat-2's ATL13 Data Product -- 14.7 Inferring Lake Ice Phenology in Mountainous Regions Using ICESat-2 Photon Data -- 14.8 Estimating Tree Heights in Mountain Regions Using ICESat-2 Photon Data -- 14.9 Utilization of ICESat-2 Photon Data to Generate Digital Elevation Models.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  2. 142362

    Encyclopedia of Database Systems

    New York, NY : Springer New York : Imprint: Springer, 2018
    Second Edition.
    Table of Contents: “….NET Remoting -- Absolute Time -- Abstract Versus Concrete Temporal Query Languages -- Abstraction -- Access Control -- Access Control Administration Policies -- Access Control Policy Languages -- Access Path -- ACID Properties -- Active and Real-Time Data Warehousing -- Active Database Coupling Modes -- Active Database Execution Model -- Active Database Knowledge Model -- Active Database Management System Architecture -- Active Database Rulebase -- Active Database, Active Database (Management) System -- Active Storage -- Active XML -- Activity -- Activity Diagrams -- Actors/Agents/Roles -- Adaptive Interfaces -- Adaptive Middleware for Message Queuing Systems -- Adaptive Query Processing -- Adaptive Stream Processing -- ADBMS -- Administration Model for RBAC -- Administration Wizards -- Advanced Information Retrieval Measures -- Aggregation: Expressiveness and Containment -- Aggregation-Based Structured Text Retrieval -- Air Indexes for Spatial Databases -- AJAX -- Allen's Relations -- AMOSQL -- AMS Sketch -- Anchor Text -- Annotation -- Annotation-based Image Retrieval -- Anomaly Detection on Streams -- Anonymity -- ANSI/INCITS RBAC Standard -- Answering Queries Using Views -- Anti-monotone Constraints -- Applicability Period -- Application Benchmark -- Application Recovery -- Application Server -- Application-Level Tuning -- Applications of Emerging Patterns for Microarray Gene Expression Data Analysis -- Applications of Sensor Network Data Management -- Approximate Queries in Peer-to-Peer Systems -- Approximate Query Processing -- Approximate Reasoning -- Approximation of Frequent Itemsets -- Apriori Property and Breadth-First Search Algorithms -- Architecture-Conscious Database System -- Archiving Experimental Data -- Armstrong Axioms -- Array Databases -- Array Databases_old -- Association Rule Mining on Streams -- Association Rules -- Asymmetric Encryption -- Atelic Data -- Atomic Event -- Atomicity -- Audio -- Audio Classification -- Audio Content Analysis -- Audio Metadata -- Audio Representation -- Audio Segmentation -- Auditing and Forensic Analysis -- Authentication -- Automatic Image Annotation -- Autonomous Replication -- Average Precision -- Average Precision at n -- Average Precision Histogram -- Average R-Precision -- B+-Tree -- Backup and Restore -- Bag Semantics -- Bagging -- Bayesian Classification -- Benchmark Frameworks -- Benchmarks for Big Data Analytics -- Big Data Platforms for Data Analytics -- Big Stream Systems -- Biological Metadata Management -- Biological Networks -- Biological Resource Discovery -- Biological Sequences -- Biomedical Data/Content Acquisition, Curation -- Biomedical Image Data Types and Processing -- Biomedical Scientific Textual Data Types and Processing -- Biostatistics and Data Analysis -- Bi-Temporal Indexing -- Bitemporal Interval -- Bitemporal Relation -- Bitmap Index -- Bitmap-based Index Structures -- Blind Signatures -- Bloom Filters -- BM25 -- Boolean Model -- Boosting -- Bootstrap -- Boyce-Codd Normal Form -- BP-Completeness -- Bpref -- Browsing -- Browsing in Digital Libraries -- B-Tree Locking -- Buffer Management -- Buffer Manager -- Buffer Pool -- Business Intelligence -- Business Process Execution Language -- Business Process Management -- Business Process Modeling Notation -- Business Process Reengineering -- Cache-Conscious Query Processing -- Calendar -- Calendric System -- CAP Theorem -- Cardinal Direction Relationships -- Cartesian Product -- Cataloging in Digital Libraries -- Causal Consistency -- Certain (and Possible) Answers -- Change Detection on Streams -- Channel-Based Publish/Subscribe -- Chart -- Chase -- Checksum and Cyclic Redundancy Check Mechanism -- Choreography -- Chronon -- Citation -- Classification -- Classification by Association Rule Analysis -- Classification in Streams -- Client-Server Architecture -- Clinical Data Acquisition, Storage and Management -- Clinical Data and Information Models -- Clinical Data Quality and Validation -- Clinical Decision Support -- Clinical Document Architecture -- Clinical Event -- Clinical Knowledge Repository -- Clinical Observation -- Clinical Ontologies -- Clinical Order -- Closed Itemset Mining and Non-redundant Association Rule Mining -- Closest-Pair Query -- Cloud Computing -- Cloud Intelligence -- Cluster and Distance Measure -- Clustering for Post Hoc Information Retrieval -- Clustering on Streams -- Clustering Overview and Applications -- Clustering Validity -- Clustering with Constraints -- Collaborative Filtering -- Column Segmentation -- Column Stores -- Common Warehouse Metamodel -- Comparative Visualization -- Compensating Transactions -- Complex Event -- Complex Event Processing -- Composed Services and WS-BPEL -- Composite Event -- Composition -- Comprehensions -- Compression of Mobile Location Data -- Computational Media Aesthetics -- Computationally Complete Relational Query Languages -- Computerized Physician Order Entry -- Conceptual Modeling Foundations -- Conceptual Schema Design -- Concurrency Control - Traditional Approaches -- Concurrency Control for Replicated Databases -- Concurrency Control Manager -- Conditional Tables -- Conjunctive Query -- Connection -- Consistency Models For Replicated Data -- Consistent Query Answering -- Constraint Databases -- Constraint Query Languages -- Constraint-Driven Database Repair -- Content-and-Structure Query -- Content-Based Publish/Subscribe -- Content-Based Video Retrieval -- Content-Only Query -- Context -- Contextualization in Structured Text Retrieval -- Continuous Data Protection -- Continuous Monitoring of Spatial Queries -- Continuous Multimedia Data Retrieval -- Continuous Queries in Sensor Networks -- Continuous Query -- ConTract -- Control Data -- Convertible Constraints -- Coordination -- Copyright Issues in Databases -- CORBA -- Correctness Criteria Beyond Serializability -- Cost and quality trade-offs in crowdsourcing -- Cost Estimation -- Count-Min Sketch -- Coupling and De-coupling -- Covering Index -- Crash Recovery -- Cross-Language Mining and Retrieval -- Cross-Modal Multimedia Information Retrieval -- Cross-Validation -- Crowd Database Operators -- Crowd Database Systems -- Crowd Mining and Analysis -- Crowdsourcing Geographic Information Systems -- Cube -- Cube Implementations -- Current Semantics -- Curse of Dimensionality -- Daplex -- Data Acquisition and Dissemination in Sensor Networks -- Data Aggregation in Sensor Networks -- Data Broadcasting, Caching and Replication in Mobile Computing -- Data Cleaning -- Data Compression in Sensor Networks -- Data Conflicts -- Data Definition -- Data Definition Language (DDL) -- Data Dictionary -- Data Encryption -- Data Estimation in Sensor Networks -- Data Exchange -- Data Fusion -- Data Fusion in Sensor Networks -- Data Generation -- Data Governance -- Data Integration Architectures and Methodology for the Life Sciences -- Data Integration in Web Data Extraction System -- Data Management for VANETs -- Data Management Fundamentals: Database Management System -- Data Management in Data Centers -- Data Manipulation -- Data Manipulation Language (DML) -- Data Mart -- Data Migration Management -- Data Mining -- Data Partitioning -- Data Privacy and Patient Consent -- Data Profiling -- Data Provenance -- Data Quality Assessment -- Data Quality Dimensions -- Data Quality Models -- Data Rank/Swapping -- Data Reduction -- Data Replication -- Data Sampling -- Data Scrubbing -- Data Sketch/Synopsis -- Data Skew -- Data Storage and Indexing in Sensor Networks -- Data Stream -- Data Stream Management Architectures and Prototypes -- Data Types in Scientific Data Management -- Data Uncertainty Management in Sensor Networks -- Data Visualization -- Data Warehouse -- Data Warehouse Life-Cycle and Design -- Data Warehouse Maintenance, Evolution and Versioning -- Data Warehouse Metadata -- Data Warehouse Security -- Data Warehousing for Clinical Research -- Data Warehousing in Cloud Environments -- Data Warehousing on Non-Conventional Data -- Data Warehousing Systems: Foundations and Architectures -- Data, Text, and Web Mining in Healthcare -- Database -- Database Adapter and Connector -- Database Administrator (DBA) -- Database Appliances -- Database Benchmarks -- Database Clustering Methods -- Database Clusters -- Database Dependencies -- Database Design -- Database Languages for Sensor Networks -- Database Machine -- Database Management System -- Database Middleware -- Database Repair -- Database Reverse Engineering -- Database Schema -- Database Security -- Database System -- Database Techniques to Improve Scientific Simulations -- Database Trigger -- Database Tuning using Combinatorial Search -- Database Tuning using Online Algorithms -- Database Tuning using Trade-off Elimination -- Database Use in Science Applications -- Datalog -- DBMS Component -- DBMS Interface -- DCE -- DCOM -- Decay Models -- Decision Rule Mining in Rough Set Theory -- Decision Tree Classification -- Decision Trees -- Declarative Networking -- Deductive Data Mining using Granular Computing -- Deduplication -- Deduplication in Data Cleaning -- Deep Instantiation -- Deep-Web Search -- Dense Index -- Dense Pixel Displays -- Density-based Clustering -- Description Logics -- Design for Data Quality -- Dewey Decimal System -- Diagram -- Difference -- Differential Privacy -- Digital Archives and Preservation -- Digital Curation -- Digital Elevation Models -- Digital Libraries -- Digital Rights Management -- Digital Signatures -- Dimension -- Dimension Reduction Techniques for Clustering -- Dimensionality Reduction -- Dimensionality Reduction Techniques For Nearest Neighbor Computations -- Dimension-Extended Topological Relationships -- Direct Attached Storage -- Direct Manipulation -- Disaster Recovery -- Disclosure Risk -- Discounted Cumulated Gain -- Discovery -- Discrete Wavelet Transform and Wavelet Synopses -- Discretionary Access Control -- Disk -- Disk Power Saving -- Distortion Techniques -.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 142363

    Handbook of social work in health and aging

    Oxford ; New York : Oxford University Press, 2006
    Table of Contents: “…Rafferty -- Policies to protect the rights of older adults / Joan Davitt.…”
    Format: Electronic eBook
    Access E-Book
  4. 142364

    The strategies of China's firms : resolving dilemmas

    Waltham, MA : Chandos Publishing is an imprint of Elsevier, 2015
    Table of Contents: “…The problem about violation of consumers rights -- 9.5.2. The impact of consumers problems with D̀̀ouble Eleven ́́shopping experience -- 9.6. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Access E-Book
    Full text (Wentworth users only)
  5. 142365

    Treasures from UCL by Furlong, Gillian

    London : UCL Press, 2015
    Table of Contents: “…An early supporter of women's rights -- Leonora Tyson, ed, An Ariti-Suffrage Alphabet, The Women's Press -- Frederick and Emmeline Pethick Lawrence, eds, Votes for Women newspaper, Vol III -- 53. …”
    Format: Electronic eBook
    Full text (Open Access)
    Access E-Book
  6. 142366

    Encyclopedia of Database Systems

    New York, NY : Springer New York : Imprint: Springer, 2019
    Table of Contents: “….NET Remoting -- Absolute Time -- Abstract Versus Concrete Temporal Query Languages -- Abstraction -- Access Control -- Access Control Administration Policies -- Access Control Policy Languages -- Access Path -- ACID Properties -- Active and Real-Time Data Warehousing -- Active Database Coupling Modes -- Active Database Execution Model -- Active Database Knowledge Model -- Active Database Management System Architecture -- Active Database Rulebase -- Active Database, Active Database (Management) System -- Active Storage -- Active XML -- Activity -- Activity Diagrams -- Actors/Agents/Roles -- Adaptive Interfaces -- Adaptive Middleware for Message Queuing Systems -- Adaptive Query Processing -- Adaptive Stream Processing -- ADBMS -- Administration Model for RBAC -- Administration Wizards -- Advanced Information Retrieval Measures -- Aggregation: Expressiveness and Containment -- Aggregation-Based Structured Text Retrieval -- Air Indexes for Spatial Databases -- AJAX -- Allen's Relations -- AMOSQL -- AMS Sketch -- Anchor Text -- Annotation -- Annotation-based Image Retrieval -- Anomaly Detection on Streams -- Anonymity -- ANSI/INCITS RBAC Standard -- Answering Queries Using Views -- Anti-monotone Constraints -- Applicability Period -- Application Benchmark -- Application Recovery -- Application Server -- Application-Level Tuning -- Applications of Emerging Patterns for Microarray Gene Expression Data Analysis -- Applications of Sensor Network Data Management -- Approximate Queries in Peer-to-Peer Systems -- Approximate Query Processing -- Approximate Reasoning -- Approximation of Frequent Itemsets -- Apriori Property and Breadth-First Search Algorithms -- Architecture-Conscious Database System -- Archiving Experimental Data -- Armstrong Axioms -- Array Databases -- Array Databases_old -- Association Rule Mining on Streams -- Association Rules -- Asymmetric Encryption -- Atelic Data -- Atomic Event -- Atomicity -- Audio -- Audio Classification -- Audio Content Analysis -- Audio Metadata -- Audio Representation -- Audio Segmentation -- Auditing and Forensic Analysis -- Authentication -- Automatic Image Annotation -- Autonomous Replication -- Average Precision -- Average Precision at n -- Average Precision Histogram -- Average R-Precision -- B+-Tree -- Backup and Restore -- Bag Semantics -- Bagging -- Bayesian Classification -- Benchmark Frameworks -- Benchmarks for Big Data Analytics -- Big Data Platforms for Data Analytics -- Big Stream Systems -- Biological Metadata Management -- Biological Networks -- Biological Resource Discovery -- Biological Sequences -- Biomedical Data/Content Acquisition, Curation -- Biomedical Image Data Types and Processing -- Biomedical Scientific Textual Data Types and Processing -- Biostatistics and Data Analysis -- Bi-Temporal Indexing -- Bitemporal Interval -- Bitemporal Relation -- Bitmap Index -- Bitmap-based Index Structures -- Blind Signatures -- Bloom Filters -- BM25 -- Boolean Model -- Boosting -- Bootstrap -- Boyce-Codd Normal Form -- BP-Completeness -- Bpref -- Browsing -- Browsing in Digital Libraries -- B-Tree Locking -- Buffer Management -- Buffer Manager -- Buffer Pool -- Business Intelligence -- Business Process Execution Language -- Business Process Management -- Business Process Modeling Notation -- Business Process Reengineering -- Cache-Conscious Query Processing -- Calendar -- Calendric System -- CAP Theorem -- Cardinal Direction Relationships -- Cartesian Product -- Cataloging in Digital Libraries -- Causal Consistency -- Certain (and Possible) Answers -- Change Detection on Streams -- Channel-Based Publish/Subscribe -- Chart -- Chase -- Checksum and Cyclic Redundancy Check Mechanism -- Choreography -- Chronon -- Citation -- Classification -- Classification by Association Rule Analysis -- Classification in Streams -- Client-Server Architecture -- Clinical Data Acquisition, Storage and Management -- Clinical Data and Information Models -- Clinical Data Quality and Validation -- Clinical Decision Support -- Clinical Document Architecture -- Clinical Event -- Clinical Knowledge Repository -- Clinical Observation -- Clinical Ontologies -- Clinical Order -- Closed Itemset Mining and Non-redundant Association Rule Mining -- Closest-Pair Query -- Cloud Computing -- Cloud Intelligence -- Cluster and Distance Measure -- Clustering for Post Hoc Information Retrieval -- Clustering on Streams -- Clustering Overview and Applications -- Clustering Validity -- Clustering with Constraints -- Collaborative Filtering -- Column Segmentation -- Column Stores -- Common Warehouse Metamodel -- Comparative Visualization -- Compensating Transactions -- Complex Event -- Complex Event Processing -- Composed Services and WS-BPEL -- Composite Event -- Composition -- Comprehensions -- Compression of Mobile Location Data -- Computational Media Aesthetics -- Computationally Complete Relational Query Languages -- Computerized Physician Order Entry -- Conceptual Modeling Foundations -- Conceptual Schema Design -- Concurrency Control - Traditional Approaches -- Concurrency Control for Replicated Databases -- Concurrency Control Manager -- Conditional Tables -- Conjunctive Query -- Connection -- Consistency Models For Replicated Data -- Consistent Query Answering -- Constraint Databases -- Constraint Query Languages -- Constraint-Driven Database Repair -- Content-and-Structure Query -- Content-Based Publish/Subscribe -- Content-Based Video Retrieval -- Content-Only Query -- Context -- Contextualization in Structured Text Retrieval -- Continuous Data Protection -- Continuous Monitoring of Spatial Queries -- Continuous Multimedia Data Retrieval -- Continuous Queries in Sensor Networks -- Continuous Query -- ConTract -- Control Data -- Convertible Constraints -- Coordination -- Copyright Issues in Databases -- CORBA -- Correctness Criteria Beyond Serializability -- Cost and quality trade-offs in crowdsourcing -- Cost Estimation -- Count-Min Sketch -- Coupling and De-coupling -- Covering Index -- Crash Recovery -- Cross-Language Mining and Retrieval -- Cross-Modal Multimedia Information Retrieval -- Cross-Validation -- Crowd Database Operators -- Crowd Database Systems -- Crowd Mining and Analysis -- Crowdsourcing Geographic Information Systems -- Cube -- Cube Implementations -- Current Semantics -- Curse of Dimensionality -- Daplex -- Data Acquisition and Dissemination in Sensor Networks -- Data Aggregation in Sensor Networks -- Data Broadcasting, Caching and Replication in Mobile Computing -- Data Cleaning -- Data Compression in Sensor Networks -- Data Conflicts -- Data Definition -- Data Definition Language (DDL) -- Data Dictionary -- Data Encryption -- Data Estimation in Sensor Networks -- Data Exchange -- Data Fusion -- Data Fusion in Sensor Networks -- Data Generation -- Data Governance -- Data Integration Architectures and Methodology for the Life Sciences -- Data Integration in Web Data Extraction System -- Data Management for VANETs -- Data Management Fundamentals: Database Management System -- Data Management in Data Centers -- Data Manipulation -- Data Manipulation Language (DML) -- Data Mart -- Data Migration Management -- Data Mining -- Data Partitioning -- Data Privacy and Patient Consent -- Data Profiling -- Data Provenance -- Data Quality Assessment -- Data Quality Dimensions -- Data Quality Models -- Data Rank/Swapping -- Data Reduction -- Data Replication -- Data Sampling -- Data Scrubbing -- Data Sketch/Synopsis -- Data Skew -- Data Storage and Indexing in Sensor Networks -- Data Stream -- Data Stream Management Architectures and Prototypes -- Data Types in Scientific Data Management -- Data Uncertainty Management in Sensor Networks -- Data Visualization -- Data Warehouse -- Data Warehouse Life-Cycle and Design -- Data Warehouse Maintenance, Evolution and Versioning -- Data Warehouse Metadata -- Data Warehouse Security -- Data Warehousing for Clinical Research -- Data Warehousing in Cloud Environments -- Data Warehousing on Non-Conventional Data -- Data Warehousing Systems: Foundations and Architectures -- Data, Text, and Web Mining in Healthcare -- Database -- Database Adapter and Connector -- Database Administrator (DBA) -- Database Appliances -- Database Benchmarks -- Database Clustering Methods -- Database Clusters -- Database Dependencies -- Database Design -- Database Languages for Sensor Networks -- Database Machine -- Database Management System -- Database Middleware -- Database Repair -- Database Reverse Engineering -- Database Schema -- Database Security -- Database System -- Database Techniques to Improve Scientific Simulations -- Database Trigger -- Database Tuning using Combinatorial Search -- Database Tuning using Online Algorithms -- Database Tuning using Trade-off Elimination -- Database Use in Science Applications -- Datalog -- DBMS Component -- DBMS Interface -- DCE -- DCOM -- Decay Models -- Decision Rule Mining in Rough Set Theory -- Decision Tree Classification -- Decision Trees -- Declarative Networking -- Deductive Data Mining using Granular Computing -- Deduplication -- Deduplication in Data Cleaning -- Deep Instantiation -- Deep-Web Search -- Dense Index -- Dense Pixel Displays -- Density-based Clustering -- Description Logics -- Design for Data Quality -- Dewey Decimal System -- Diagram -- Difference -- Differential Privacy -- Digital Archives and Preservation -- Digital Curation -- Digital Elevation Models -- Digital Libraries -- Digital Rights Management -- Digital Signatures -- Dimension -- Dimension Reduction Techniques for Clustering -- Dimensionality Reduction -- Dimensionality Reduction Techniques For Nearest Neighbor Computations -- Dimension-Extended Topological Relationships -- Direct Attached Storage -- Direct Manipulation -- Disaster Recovery -- Disclosure Risk -- Discounted Cumulated Gain -- Discovery -- Discrete Wavelet Transform and Wavelet Synopses -- Discretionary Access Control -- Disk -- Disk Power Saving -- Distortion Techniques -.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  7. 142367

    PID and predictive control of electrical drives and power supplies using MATLAB/Simulink by Wang, Liuping

    Solaris South Tower, Singapore : John Wiley & Sons, Inc., 2015
    Table of Contents: “…8.2.1 Augmented Model 269 -- 8.2.2 Design without Constraints 270 -- 8.2.3 Formulation of the Constraints 272 -- 8.2.4 On-line Solution for Constrained MPC 272 -- 8.3 Experimental Evaluation of DMPC of PMSM 274 -- 8.3.1 The MPC Parameters 274 -- 8.3.2 Constraints 275 -- 8.3.3 Response to Load Disturbances 275 -- 8.3.4 Response to a Staircase Reference 277 -- 8.3.5 Tuning of the MPC controller 278 -- 8.4 Power Converter Control Using DMPC with Experimental Validation 280 -- 8.5 Summary 281 -- 8.6 Further Reading 282 -- References 283 -- 9 Continuous-time Model Predictive Control (CMPC) of Electrical Drives and PowerConverter 285 -- 9.1 Continuous-time MPC Design 286 -- 9.1.1 Augmented Model 286 -- 9.1.2 Description of the Control Trajectories Using Laguerre Functions 287 -- 9.1.3 Continuous-time Predictive Control without Constraints 289 -- 9.1.4 Tuning of CMPC Control System Using Exponential Data Weighting and Prescribed Degree of Stability 292 -- 9.2 CMPC with Nonlinear Constraints 294 -- 9.2.1 Approximation of Nonlinear Constraint Using Four Linear Constraints 294 -- 9.2.2 Approximation of Nonlinear Constraint Using Sixteen Linear Constraints 294 -- 9.2.3 State Feedback Observer 297 -- 9.3 Simulation and Experimental Evaluation of CMPC of Induction Motor 298 -- 9.3.1 Simulation Results 298 -- 9.3.2 Experimental Results 300 -- 9.4 Continuous-time Model Predictive Control of Power Converter 301 -- 9.4.1 Use of Prescribed Degree of Stability in the Design 302 -- 9.4.2 Experimental Results for Rectification Mode 303 -- 9.4.3 Experimental Results for Regeneration Mode 303 -- 9.4.4 Experimental Results for Disturbance Rejection 304 -- 9.5 Gain Scheduled Predictive Controller 305 -- 9.5.1 The Weighting Parameters 305 -- 9.5.2 Gain Scheduled Predictive Control Law 307 -- 9.6 Experimental Results of Gain Scheduled Predictive Control of Induction Motor 309 -- 9.6.1 The First Set of Experimental Results 309 -- 9.6.2 The Second Set of Experimental Results 311 -- 9.6.3 The Third Set of Experimental Results 312.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Access E-Book
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  8. 142368

    Ernest Dowson Collected Poems. by Thornton, R. K. R.

    Bloomsbury Publishing, 2003
    Table of Contents: “…Beata Solitudo -- Terre Promise -- Autumnal -- In Tempore Senectutis -- Villanelle of his Lady's Treasures -- Gray Nights -- Vesperal -- The Garden of Shadow -- Soli cantare periti Arcades -- On the Birth of a Friend's Child -- Extreme Unction -- Amantium Irae -- Impenitentia Ultima -- A Valediction -- Sapientia Lunae -- Cease smiling, Dear! …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  9. 142369

    The Ashgate encyclopedia of literary and cinematic monsters by Weinstock, Jeffrey Andrew

    Farnham, Surrey, England ; Burlington, Vermont :; Boston, Massachusetts : Ashgate,; Credo Reference, 2014; 2015
    [Enhanced Credo edition].
    Table of Contents: “…Acknowledgments -- List of illustrations -- List of entries -- Introduction -- A: Angel; Animals, Monstrous; Arabian Nights, Monsters In The -- B: Banshee; Basilisk; Bates, Norman; Bathory, Countess; Beast, (Beauty and the); Behemoth; Bell Witch, The; Bible, Monsters In The; Bigfoot; Birds, Giant; Blair Witch; Blob, The; Body; Bronze Horseman; Brownie; Bunyip -- C: Caliban; Carmilla; Cenobites; Centaur; Cerberus; Children, Monstrous; Children's Literature, Monsters In; Chimera; Christine; Chucky; Chupacabra; Circe; Cockatrice; Collins, Barnabas; Creature from the Black Lagoon, The; Cryptid; Cyborg; Cyclops -- D: Damned Thing, The; Dante, Monsters In; Death, Personified; Demons; Medieval Demons; British and Irish Demons; North American Demons; European and Russian Demons; African and Caribbean Demons; South Asian Demons; Chinese Demons; Japanese Demons; Devil Bug; Devil, The; Dinosaur; Div; Djinn and Genie; Donestre; Doppelganger; Dracula; Dragon; Dungeons & Dragons, Monsters In; Dvoinik; Dwarf; Dweller on the Threshold; Dybbuk -- E: Elemental; Elf; Empousa; Extraterrestrial -- F: Fairy; Faun and Satyr; Fly, The; Frankenstein's Monster; Furies -- G: Gargantua and Pantagruel; Gargoyle; Ghost; Classical and Medieval Ghost; European and Russian Ghost; Great Britain and Ireland's Ghosts; United States and Canadian Ghosts; Latin American Ghosts; African and the Caribbean Ghosts; South Asian Ghosts; Southeast Asian Ghosts; China's Ghosts; Japan's Ghosts; Ghoul; Giant; Gibbelin; Goblin; Godzilla; Golem; Gorgons; Gray, Dorian; Gremlin; Grendel and Grendel's Mother; Griffin -- H: Harpy; Harry Potter, Monsters In; Haunted House; Headless Horseman, The; Hermaphrodite; Hippogriffin; Homunculus; Hop-Frog; Horla, The; Hyde, Edward; Hydra -- I: Imp; Incubus/Succubus; Invisible Man, The -- J: Jabberwock; Jack the Ripper; Johnson, Henry -- K: Kappa; King Kong; Kitsune; Koran, Monsters In The; Kraken; Krueger, Freddy -- L: Lamia; Lecter, Hannibal; Leprechaun ; Lestat de Lioncourt ; Leviathan ; Lilith ; Llorona, La; Loch Ness Monster; Lovecraft, Monsters In -- M: Maenad; Mahbhrata, Monsters In; Manitou; Manticore; Marsh, Arabella; Matilda; Medusa; Melmoth the Wanderer; Mephistopheles; Mermaid/Merman; Micromegas; Minotaur; Moby Dick; Moloch; Monkey King; Mummy; Mutant and Freak; Myers, Michael.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (Wentworth users only)
  10. 142370

    The Routledge companion to world literature

    Milton Park, Abingdon, Oxon ; New York :; Boston, Massachusetts : Routledge,; Credo Reference, 2012; 2015
    [Enhanced Credo edition]
    Table of Contents: “…Dainotto -- World literature and Latin American literature / Djelal Kadir -- World literature and US American literature / Lawrence Buell -- African roads / Nirvana Tanoukhi -- World literature and East Asian literature / Red Chan -- Constructions of world literature in colonial and postcolonial India / Vinay Dharwadker -- The thousand and one nights as world literature / Sandra Naddaff -- World literature and Muslim Southeast Asia / Ronit Ricci.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Access E-Book
    Full text (Wentworth users only)
  11. 142371

    One hundred women's stage monologues from the 1980's

    Newbury, Vt. : Smith and Kraus, 1991
    First edition.
    Table of Contents: “…Pielmeier -- Ines de Castro -- Iranian nights / T. Ali, H. Brenton -- Loman family picnic / D. …”
    Format: Book


  12. 142372

    HaXe 2 Beginner's Guide. by Dasnois, Benjamin

    Birmingham : Packt Pub., 2011
    Table of Contents: “…Installing on MacOSXInstalling on Linux; Installing nightly builds; Verifying your installation; Choosing an editor; FlashDevelop 3; The TextMate bundle; VIM; Writing your first program; Time for action-Writing a Hello World; What just happened?…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  13. 142373

    The Ashgate encyclopedia of literary and cinematic monsters

    Farnham, Surrey, England ; Burlington, Vermont :; Boston, Massachusetts : Ashgate,; Credo Reference, 2014; 2015
    [Enhanced Credo edition]
    Table of Contents: “…Acknowledgments -- List of illustrations -- List of entries -- Introduction -- A: Angel; Animals, Monstrous; Arabian Nights, Monsters In The -- B: Banshee; Basilisk; Bates, Norman; Bathory, Countess; Beast, (Beauty and the); Behemoth; Bell Witch, The; Bible, Monsters In The; Bigfoot; Birds, Giant; Blair Witch; Blob, The; Body; Bronze Horseman; Brownie; Bunyip -- C: Caliban; Carmilla; Cenobites; Centaur; Cerberus; Children, Monstrous; Children's Literature, Monsters In; Chimera; Christine; Chucky; Chupacabra; Circe; Cockatrice; Collins, Barnabas; Creature from the Black Lagoon, The; Cryptid; Cyborg; Cyclops -- D: Damned Thing, The; Dante, Monsters In; Death, Personified; Demons; Medieval Demons; British and Irish Demons; North American Demons; European and Russian Demons; African and Caribbean Demons; South Asian Demons; Chinese Demons; Japanese Demons; Devil Bug; Devil, The; Dinosaur; Div; Djinn and Genie; Donestre; Doppelganger; Dracula; Dragon; Dungeons and Dragons, Monsters In; Dvoinik; Dwarf; Dweller on the Threshold; Dybbuk -- E: Elemental; Elf; Empousa; Extraterrestrial -- F: Fairy; Faun and Satyr; Fly, The; Frankenstein's Monster; Furies -- G: Gargantua and Pantagruel; Gargoyle; Ghost; Classical and Medieval Ghost; European and Russian Ghost; Great Britain and Ireland's Ghosts; United States and Canadian Ghosts; Latin American Ghosts; African and the Caribbean Ghosts; South Asian Ghosts; Southeast Asian Ghosts; China's Ghosts; Japan's Ghosts; Ghoul; Giant; Gibbelin; Goblin; Godzilla; Golem; Gorgons; Gray, Dorian; Gremlin; Grendel and Grendel's Mother; Griffin -- H: Harpy; Harry Potter, Monsters In; Haunted House; Headless Horseman, The; Hermaphrodite; Hippogriffin; Homunculus; Hop-Frog; Horla, The; Hyde, Edward; Hydra -- I: Imp; Incubus/Succubus; Invisible Man, The -- J: Jabberwock; Jack the Ripper; Johnson, Henry -- K: Kappa; King Kong; Kitsune; Koran, Monsters In The; Kraken; Krueger, Freddy -- L: Lamia; Lecter, Hannibal; Leprechaun ; Lestat de Lioncourt ; Leviathan ; Lilith ; Llorona, La; Loch Ness Monster; Lovecraft, Monsters In -- M: Maenad; Mahbhrata, Monsters In; Manitou; Manticore; Marsh, Arabella; Matilda; Medusa; Melmoth the Wanderer; Mephistopheles; Mermaid/Merman; Micromegas; Minotaur; Moby Dick; Moloch; Monkey King; Mummy; Mutant and Freak; Myers, Michael --…”
    Format: Electronic eBook
    Access E-Book
  14. 142374

    Mastering CryENGINE. by Gundlach, Sascha

    Packt Publishing, 2014
    Table of Contents: “…; Importance of a strong pipeline; Version control for CryENGINE projects; What version control does for you; Production without version control; Working from a shared folder; Selecting a VCS for CryENGINE projects; Setting up version control for CryENGINE; Sandbox; Identifying CryENGINE project files to be excluded from version control; Automated builds and build scripts; Creating nightly builds.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  15. 142375

    Insect conservation and Australia’s Inland Waters by New, Tim R.

    Cham : Springer International Publishing : Imprint: Springer, 2020
    1st ed. 2020.
    Table of Contents: “…Dispersal -- 10.2.1. Impacts of urban lighting -- 10.2.2. Pond colonization -- References -- 11. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  16. 142376

    The Columbia anthology of gay literature : readings from Western antiquity to the present day

    New York : Columbia University Press, 1998
    Table of Contents: “…Out of the shadow world -- Inventing and enforcing modern homophobia (1933-1969) -- Lighting the shadow world -- pt. 9. Out there -- 29. …”
    Format: Book


  17. 142377

    The School for Scandal

    New York, N.Y. : Films Media Group, 2014
    Table of Contents: “…The School for Scandal: Act 1: Scene 1 (19:28) -- The School for Scandal: Act 1: Scene 2 (5:34) -- The School for Scandal: Act 2: Scene 1 (6:05) -- The School for Scandal: Act 2: Scene 2 (11:47) -- The School for Scandal: Act 2: Scene 3 (4:17) -- The School for Scandal: Act 3: Scene 1 (13:06) -- The School for Scandal: Act 3: Scene 2 (2:58) -- The School for Scandal: Act 3: Scene 3 (12:19) -- The School for Scandal: Act 4: Scene 1 (9:25) -- The School for Scandal: Act 4: Scene 2 (1:31) -- The School for Scandal: Act 4: Scene 3 (24:32) -- The School for Scandal: Act 5: Scene 1 (9:05) -- The School for Scandal: Act 5: Scene 2 (11:47) -- The School for Scandal: Act 5: Scene 3 (13:48) -- Curtain Call (0:43) -- Credits: The School for Scandal (0:49) -- Cast Interviews: Director (2:52) -- Cast Interviews: Director II (5:01) -- Cast Interviews: Production & Costume Designer (2:58) -- Cast Interviews: Lighting Designer (4:04) -- Cast Interviews: Lady Sneerwell (6:03) -- Cast Interviews: Sir Peter Teazle (5:51) -- Cast Interviews: Lady Teazle (3:07) -- Cast Interviews: Mrs. …”
    Format: Electronic Video
    Streaming video (Emerson users only)
    Streaming video (Wentworth users only)
  18. 142378

    West African 'ulamā' and Salafism in Mecca and Medina : jawab al-Ifrīqī-the response of the African by Ahmed, Chanfi

    Leiden, Netherlands ; Boston [Massachusetts] : Brill, 2015
    Table of Contents: “…Mahṃūd al-Madanī (Ag Mahṃūd Abdullahi): The "Intransigent" Salafī MissionaryChapter 3 The ʻUlamāʼ of the Second Generation, Heirs of the Hijra and Teachers in the First Islamic Institutes in Saudi Arabia; Hạmmād al-Ansạ̄rī (1344-1418/1925-97); "Rihḷat min Ifrīqyā ilā bilād al-hạramayn" [Traveling from Africa to the two holy cities]; The Ansạ̄r al-Sunna in Sudan; The Legacy of Shaykh Hạmmād al-Ansạ̄rī in West Africa; ʻAbd al-Rahṃān Yūsuf al-Ifrīqī; Al-Anwār al-rahṃāniyya li-hidāyat al-firqa al-Tijāniyya [The divine lights to save the Tijāniyya sect].…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  19. 142379

    Italian Neorealist Cinema : an Aesthetic Approach. by Wagstaff, Christopher

    Toronto : University of Toronto Press, 2008
    2nd ed.
    Table of Contents: “…Acknowledgments; Introduction; 1 Overview; The Italian Cinema Industry; The Cultural Context; Films: Production and Screenwriting; The Pro-filmic; The Institution of Neorealism; 2 Realism; Aesthetics; Reference; Narrative; Genre; Idealism; Realism; Cesare Zavattini; Rhetoric; A Note on Comedy; 3 Roma città aperta; Photography; Lighting; Sound; Mise en scène; Performers; Costume; The Narrative: Story and Plot; Dramaturgy: Analysis of the Episode of the Shooting of Pina; Roma città aperta and Neorealism; 4 Paisà; The Rome Episode; The Sicily Episode; The Monastery Episode.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  20. 142380

    Augmented Reality for Developers. by Linowes, Jonathan

    Birmingham : Packt Publishing, 2017
    Table of Contents: “…Objects and hierarchyScene editing -- Adding a cube -- Adding a plane -- Adding a material -- Saving the scene -- Changing the Scene view -- Game development -- Material textures, lighting, and shaders -- Animation -- Physics -- Additional features -- Using Cameras in AR -- Getting and using Vuforia -- Installing Vuforia -- Downloading the Vuforia Unity package -- Importing the Vuforia Assets package -- VuforiaConfiguration setup -- License key -- Webcam -- Building a quick demo with Vuforia -- Adding AR Camera prefab to the Scene…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)