Academic literature on the topic 'Building machines and gadgerty'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Building machines and gadgerty.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Building machines and gadgerty"

1

Vishwakarma, Pawan. "A Conceptual Study on Security Issues in IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 3404–11. http://dx.doi.org/10.22214/ijraset.2021.37078.

Full text
Abstract:
IoT is the component which is set up between advanced machines and associated gadgets. It is an interrelated framework where every thing has a novel identifier and consequently moves information and works the framework which works in the internet. Be that as it may, it isn't protected to leave the gadgets open since programmers or infections can undoubtedly assault or cut the information of the concerned individual or client. Various high-profile episodes where a typical IoT gadget was utilized to invade and assault the bigger organization has caused to notice the requirement for IoT security. Lacking information insurance (correspondence and capacity) The most regular worries in the information security of IoT applications are because of shaky interchanges and information stockpiling. One of the critical difficulties for IoT protection and security is that compromised gadgets can be utilized to get to classified information. It is basic to guaranteeing the security of organizations with IoT gadgets associated with them. Security in IoT is the demonstration of getting Internet of Things gadgets and the organizations they're associated with. In the business setting, IoT gadgets incorporate modern machines, keen energy networks, building mechanization, in addition to whatever individual IoT gadgets representatives bring to work. This scope of gadgets can present security hazards that can undermine your business. Every now and again planned without security, IoT gadgets have become another danger vector for agitators to utilize when dispatching assaults. We have effectively seen a few assaults utilizing these disseminated, apparently blameless gadgets. IoT security, incorporates a wide scope of procedures, systems, conventions and activities that intend to alleviate the expanding IoT weaknesses of present day organizations. In this paper the theoretical investigation of safety issues in IoT is given
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Shobhita. "IoT: A Mainstay Towards Intelligent Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3192–96. http://dx.doi.org/10.17762/turcomat.v12i3.1561.

Full text
Abstract:
After the .com boom, the next big thing in the 21st century is the “Internet of Things”. The “Internet of Things” is exploding and infusing intelligence globally. From infinitesimal chips to mammoth machineries, billions of smart gadgets communicate with each other with the aid of wireless devices. The day is not far when every physical item will no longer remain disconnected from the virtual world. Presently, your coffee kettle starts automatically when you wake up in the morning and lights go off when you leave home for your office where all devices are controlled/activated through your voice. Dream becomes reality, when the whole world will be running automatically and virtually with the initiation of a command. Connecting ‘Internet of Things’ with ‘Artificial Intelligence’, high-tech and scientific technologies will transform the world into a completely digital world. These two powerful pillars will build super-intelligent e-devices that are ready for new challenges. It will be made possible by evolving IP strategies, Radio Frequency Identification (RFID), embedded sensors, actuators that are intelligently connected in machines and other physical objects. This paper aims to provide an insight into how the third wave of information technology i.e. Internet of Things (IoT) will interconnect the physical world using artificial intelligence. The paper will further discuss the building blocks of the IoT and the perspective areas where it can be implemented smartly.
APA, Harvard, Vancouver, ISO, and other styles
3

Samy, Mohamed M., Wagdy R. Anis., Ahmed A. Abdel-Hafez, and Haitham D. Eldemerdash. "An Optimized Protocol of M2M Authentication for Internet of Things (IoT)." International Journal of Computer Network and Information Security 13, no. 2 (2021): 29–38. http://dx.doi.org/10.5815/ijcnis.2021.02.03.

Full text
Abstract:
The Internet of Things (IoT) consists of sensors, networks, and services to connect and control production systems. Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices are enabled to exchange information with each other in an autonomous way without human intervention. Resource-Constrained Devices (RCD) have found an expanding demand in the Internet of Things (IoT) applications as these gadgets are essentially working with delicate information. Thus, information security has ended up vital for both makers and clients. However, the creation of defenseless gadgets still challenging regarding the restriction of involved assets especially with the attackers ‘continuous trials to misuse these restrictions chasing important information. Hence, connecting an open key crypto-system becomes a must to extend gadget proficiency and relieve the chance of touchy data loss. Deployments of Elliptic curve cryptography (ECC) are fundamentally an open key crypto-system with the basic distinction of speedier advancing capacity whereas yielding an assortment of distinctive approaches to the arrangement of the cryptographic calculation. We will submit a proposed protocol to overcome the demands of information security and the speed of data circulation. The proposed protocol is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against various attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Davies, E. B. "Building Infinite Machines." British Journal for the Philosophy of Science 52, no. 4 (2001): 671–82. http://dx.doi.org/10.1093/bjps/52.4.671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scheifele, Lisa Z. "Building Microbial Machines." Journal of Microbiology & Biology Education 11, no. 2 (2010): 187. http://dx.doi.org/10.1128/jmbe.v11i2.206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duggan, Shane. "Photons in the machine." Boolean: Snapshots of Doctoral Research at University College Cork, no. 2015 (January 1, 2015): 65–69. http://dx.doi.org/10.33178/boolean.2015.13.

Full text
Abstract:
All our gadgets, mobile phones, music players, tablets, contain computer chips. These chips are powerful enough to store an abundance of knowledge. They are also small enough to allow the majority of our gadgets to fit in our pockets. My work focuses on designing and building parts of circuits for these computer chips to simultaneously give them greater power and smaller size while using less energy. At this moment you are in a warzone of tiny photon torpedoes. They are being fired in your pocket, on the screen in front of you. In actuality photons are blasting your eyes, because photons are just particles of light! We communicate with photons/light all the time. As you read this your eyes are receiving photons and your brain is processing the information. This appears quite a complicated process, your mind has to decide what is text and what is background, and from there ...
APA, Harvard, Vancouver, ISO, and other styles
7

Aleksander, Igor. "Building machines more like humans." Nature 416, no. 6883 (2002): 789–90. http://dx.doi.org/10.1038/416789a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramezani, Hamid, and Hendrik Dietz. "Building machines with DNA molecules." Nature Reviews Genetics 21, no. 1 (2019): 5–26. http://dx.doi.org/10.1038/s41576-019-0175-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Li-Yi. "Building nonlocal machines using GHZ states." Physics Letters A 342, no. 5-6 (2005): 368–74. http://dx.doi.org/10.1016/j.physleta.2005.05.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guala, Francesco. "Building economic machines: The FCC auctions." Studies in History and Philosophy of Science Part A 32, no. 3 (2001): 453–77. http://dx.doi.org/10.1016/s0039-3681(01)00008-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Building machines and gadgerty"

1

Kertesz, Vladimír. "Montovaná hala Dunajská Lužná. Stavebně technologické řešení." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2012. http://www.nusl.cz/ntk/nusl-225474.

Full text
Abstract:
The thesis deals with realization of a new assembled hall in Dunajska Luzna. This hall has two floors and is based on ferroconctrete foot. Carrying contruction system consist of steel profiles. Siding frontage is designed with sandwich panels. The work deals also with technical and economical part of the building.
APA, Harvard, Vancouver, ISO, and other styles
2

Felton, Samuel M. "Methods for Building Self-Folding Machines." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:17467471.

Full text
Abstract:
Origami can turn a sheet of paper into complex three-dimensional shapes, and similar folding techniques can be used to build structures and mechanisms. However, folding by hand can be difficult and time consuming. This has led to the development of self-folding materials that transform themselves from flat sheets into 3D shapes by bending themselves along hinges. A variety of self-folding methods have been demonstrated at a variety of length scales, but they have not yet been used to build complex machines. This dissertation demonstrates that self-folding can produce functional machines with a new laminate we refer to as a shape memory composite. We characterize the behavior of this composite with models and experimental data, and use this information to develop design rules for self-folding. We apply these rules to create devices at multiple length scales, including a model crane, a crawling robot, a lamp, and a model ship.<br>Engineering and Applied Sciences - Engineering Sciences
APA, Harvard, Vancouver, ISO, and other styles
3

Heathcote, Jonathan David. "Building and operating large-scale SpiNNaker machines." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/building-and-operating-largescale-spinnaker-machines(6151916a-ed71-42e4-97d2-2993a4caf5f6).html.

Full text
Abstract:
SpiNNaker is an unconventional supercomputer architecture designed to simulate up to one billion biologically realistic neurons in real-time. To achieve this goal, SpiNNaker employs a novel network architecture which poses a number of practical problems in scaling up from desktop prototypes to machine room filling installations. SpiNNaker's hexagonal torus network topology has received mostly theoretical treatment in the literature. This thesis tackles some of the challenges encountered when building `real-world' systems. Firstly, a scheme is devised for physically laying out hexagonal torus topologies in machine rooms which avoids long cables; this is demonstrated on a half-million core SpiNNaker prototype. Secondly, to improve the performance of existing routing algorithms, a more efficient process is proposed for finding (logically) short paths through hexagonal torus topologies. This is complemented by a formula which provides routing algorithms with greater flexibility when finding paths, potentially resulting in a more balanced network utilisation. The scale of SpiNNaker's network and the models intended for it also present their own challenges. Placement and routing algorithms are developed which assign processes to nodes and generate paths through SpiNNaker's network. These algorithms minimise congestion and tolerate network faults. The proposed placement algorithm is inspired by techniques used in chip design and is shown to enable larger applications to run on SpiNNaker than the previous state-of-the-art. Likewise the routing algorithm developed is able to tolerate network faults, inevitably present in large-scale systems, with little performance overhead.
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Byungjin. "BUILDING A SECURE NETWORK TEST ENVIRONMENT USING VIRTUAL MACHINES." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/947.

Full text
Abstract:
The objective of this project is to provide an overview of how to create a secure network test environment using virtual machines with Red Hat CentOS 7. Using virtual machines to create a secure network test environment simplify the workflow of testing several servers including network segmentation, network path redundancy, and traffic control using a firewall. This study suggests a set of guidelines for building a secure network test environment that includes a Domain Name Server (DNS), Web Server, File Transfer Protocol (FTP) Server, and a firewall. The documentation provided in this project is primarily useful for IT students looking to recreate a similar environment of their own and to practice special skills needed within their field of study.
APA, Harvard, Vancouver, ISO, and other styles
5

Atchuta, Kaushik. "Slicing of extended finite state machines." Kansas State University, 2014. http://hdl.handle.net/2097/17640.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Torben Amtoft<br>An EFSM (Extended Finite State Machine) is a tuple (S, T, E, V) where S is a finite set of states, T is a finite set of transitions, E is a finite set of events, and V is a finite set of variables. Every transition t in T has a source state and a target state, both in S. There is a need to develop a GUI which aids in building such machines and simulating them so that a slicing algorithm can be implemented on such graphs. This was the main idea of Dr. Torben Amtoft, who has actually written the slicing algorithm and wanted this to be implemented in code. The project aims at implementing a GUI which is effective to simulate and build the graph with minimum user effort. Poor design often fails to attract users. So, the initial effort is to build a simple and effective GUI which serves the purpose of taking input from the user, building graphs and simulating it. The scope of this project is to build and implement an interface so that the users can do the following in an effective way:  Input a specification of an EFSM  Store and later retrieve EFSMs  Displaying an EFSM in a graphical form  Simulating the EFSM  Modify an EFSM  Implement the slicing algorithm All the above mentioned features must be integrated into the GUI and it should only fail if the input specification is wrong.
APA, Harvard, Vancouver, ISO, and other styles
6

Shaffer, Marcus. "Rise Tectonic Machines!: The Revitalization of the Relationship Between Architects and Machines as a Means of Restoring Intimacy, Immediacy, and Delight to the Act of Building." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34283.

Full text
Abstract:
Architectural form is both an expression of human desire and built edifice directly related to construction methods. It follows that the responsibilities of the architect seeking new form must extend to the instrumentation of tectonic machines and devices, which are also appropriately new. This thesis proposes a revitalization of the relationship between the architect and machines as a means of restoring intimacy, immediacy, and delight to the act of building. What follows is a presentation of images, photographs, and models related to the design and development of an architecture machine, and related constructions.<br>Master of Architecture
APA, Harvard, Vancouver, ISO, and other styles
7

Riss, yaw Benjamin. "Des Synthons Entrelacés pour la Préparation Efficace de Machines Moléculaires et de Rotaxanes Dénués de Site de Reconnaissance." Thesis, Montpellier, 2018. http://www.theses.fr/2018MONTS143.

Full text
Abstract:
Cette thèse est dédiée à la conception de synthons entrelacés pour la préparation efficace de machines moléculaires pH-sensible de type rotaxane et de rotaxanes dénués de site de reconnaissance. Bien que la stratégie dirigée par l’effet « template » ait été employée très fréquemment et avec succès à ce jour, elle ne mène dans la plupart des cas qu’à des composés entrelacés qui contiennent les sites d’interactions nécessaires à la reconnaissance préalable des éléments moléculaires à assembler. Pour remédier à cette limitation, une nouvelle voie d’accès directe utilisant des synthons entrelacées pour la préparation de machines moléculaires de type rotaxanes et de rotaxanes dénués de site d’interaction fort a été étudié. Dans un premier temps, des « briques moléculaires » [2]rotaxanes isolables, bien qu’activées, ont été obtenus par une stratégie de glissement. Dans le but de les convertir aisément en machines moléculaires, les paramètres cinétiques et thermodynamiques relatifs au processus d’entrelacement ont été déterminés et ont permis de juger de l’importance de la nature et de l’orientation des pseudo-bouchons sur la cinétique d’entrelacement, ainsi que du rôle primordial du degré de liberté conformationnel de l’axe moléculaire sur la vitesse de formation des rotaxanes. Par la suite, les synthons entrelacées activés sous forme d’ester actif (ester de NHS isolable) sont utilisées dans la préparation de différentes machines moléculaires possédant une station moléculaire principale ammonium et une station moléculaire secondaire triazolium ou amide (secondaire ou tertiaire). D’autres synthons entrelacés qui différent par l’orientation du motif NHS sont utilisé comme transporteurs d’éther couronne pour permettre la préparation de rotaxanes dénués de site d’interaction fort. Enfin, dans la continuité des travaux réalisés au laboratoire sur le contrôle de la conformation chaise d’un mannosyl par une machinerie moléculaire, de nouvelles navettes pH-sensible de type glyco[2]rotaxanes contenant toutes une station moléculaire principale anilinium, et qui différent des machines précédentes par la deuxième station pyridinium, ont été obtenus et étudiés<br>This thesis is dedicated to the synthesis of interlocked synthons for the efficient preparation of pH-sensitive rotaxane molecular machines and rotaxanes devoid of recognition site. Although the strategy directed by the "template" effect has been used very frequently and successfully so far, in most cases it only leads to interlocked compounds that contain the interaction sites necessary for prior recognition molecular elements to assemble. To overcome this limitation, a new direct access using interlocked synthons for the preparation of molecular machines of the rotaxane and rotaxane type devoid of strong interaction sites has been studied. Firstly, isolable [2]rotaxane "building block", although activated, were obtained by a slipping strategy. In order to easily convert them into molecular machines, the kinetic and thermodynamic parameters relating to the slipping process were determined and made it possible to judge the importance of the nature and orientation of the pseudo-stopper on the kinetics of slipping, as well as the primordial role of the degree of conformational freedom of the molecular axis on the speed of formation of rotaxanes. Subsequently, the activated ester (NHS isolatable ester) interlocked synthon are used in the preparation of different molecular machines having a main ammonium molecular station and a secondary molecular triazolium or amide station (secondary or tertiary). Other interlocked synthons that differ in the orientation of the NHS motif are used as crown ether transporters to enable the preparation of rotaxanes devoid strong interaction sites. Finally, in the continuity of the work carried out in the laboratory on the control of the chair conformation of a mannosyl by a molecular machinery, new pH-sensitive shuttles of glyco[2]rotaxane containing a main molecular station anilinium, and which different previous machines by the second station pyridinium, were obtained and studied
APA, Harvard, Vancouver, ISO, and other styles
8

Koc, San Dilek. "Approaches For Automatic Urban Building Extraction And Updating From High Resolution Satellite Imagery." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/3/12610501/index.pdf.

Full text
Abstract:
Approaches were developed for building extraction and updating from high resolution satellite imagery. The developed approaches include two main stages: (i) detecting the building patches and (ii) delineating the building boundaries. The building patches are detected from high resolution satellite imagery using the Support Vector Machines (SVM) classification, which is performed for both the building extraction and updating approaches. In the building extraction part of the study, the previously detected building patches are delineated using the Hough transform and boundary tracing based techniques. In the Hough transform based technique, the boundary delineation is carried out using the processing operations of edge detection, Hough transformation, and perceptual grouping. In the boundary tracing based technique, the detected edges are vectorized using the boundary tracing algorithm. The results are then refined through line simplification and vector filters. In the building updating part of the study, the destroyed buildings are determined through analyzing the existing building boundaries and the previously detected building patches. The new buildings are delineated using the developed model based approach, in which the building models are selected from an existing building database by utilizing the shape parameters. The developed approaches were tested in the Batikent district of Ankara, Turkey, using the IKONOS panchromatic and pan-sharpened stereo images (2002) and existing vector database (1999). The results indicate that the proposed approaches are quite satisfactory with the accuracies computed in the range from 68.60% to 98.26% for building extraction, and from 82.44% to 88.95% for building updating.
APA, Harvard, Vancouver, ISO, and other styles
9

Štefaňák, Jan. "Stavebně technologický projekt výrobní haly Rokycany." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2012. http://www.nusl.cz/ntk/nusl-225511.

Full text
Abstract:
Master´s Thesis describes the realization setup procedure of factory building in Rokycany. Building has precast concrete skeleton based on in-situ concrete piles. Document consists of concept of site accommodation, sizing of building machines, time schedule, technological rules and constraints for the chosen technological processes and plan of workplace safety and health.
APA, Harvard, Vancouver, ISO, and other styles
10

Huková, Martina. "Stavebně technologická příprava prodejny Smart Light v Bratislavě." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2019. http://www.nusl.cz/ntk/nusl-392005.

Full text
Abstract:
The main subject of this diploma thesis is elaboration of construction and technological preparation for the main structure of the Smart Light shop in Bratislava. For main structure has been processed time schedule of the construction, single item budget, machine configuration design, drawing of building site, coordination situation of the building with connection to the infrastructure, safety and health protection during work on building site. Part of the thesis is processing study of main construction technological parts. Diploma thesis in technological prescript focuses on implementation of floor structure with cast epoxy walking surface. There has been elaborated testing and quality plan of this technological part. Additional chapter approximates built-in technology – cooling ceiling structure. For elaboration of this diploma thesis were used programs AutoCAD, CONTEC, BuildPowerS, Microsoft Excel, Microsoft Word.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Building machines and gadgerty"

1

Gill, Bridgewater, ed. Building wooden machines: Gears & gadgets for the adventurous woodworker. F & W Media, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1940-, Thompson Graham, ed. Monster building machines. Barron's, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Artificial intelligence: Building smarter machines. Twenty-First Century Books, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barton, Byron. Machines at work. MacRae, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barton, Byron. Machines at work. HarperFestival, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barton, Byron. Machines at work. Crowell, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lampton, Christopher. Nanotechnology playhouse: Building machines from atoms. Waite Group Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Radford, Derek. Building machines and what they do. Candlewick Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Radford, Derek. Building machines and what they do. Walker, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Radford, Derek. Building machines and what they do. Candlewick Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Building machines and gadgerty"

1

Dedò, Maria. "Machines for Building Symmetry." In Mathematics and Art. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04909-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Credi, Alberto, Serena Silvi, and Margherita Venturi. "Building Molecular Machines on Surfaces." In The Supramolecular Chemistry of Organic-Inorganic Hybrid Materials. John Wiley & Sons, Inc., 2010. http://dx.doi.org/10.1002/9780470552704.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prevelige, Peter E., and Bentley A. Fane. "Building the Machines: Scaffolding Protein Functions During Bacteriophage Morphogenesis." In Viral Molecular Machines. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4614-0980-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yeluri, Raghu, and Enrique Castro-Leon. "Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud." In Building the Infrastructure for Cloud Security. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6146-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bisong, Ekaba. "Support Vector Machines." In Building Machine Learning and Deep Learning Models on Google Cloud Platform. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4470-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Simpkins, Stacy. "Joining the Machines to the Domain." In Building a SharePoint 2016 Home Lab. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2170-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Borges, Mario Neto. "A Framework for Building a Knowledge-Based System for Curriculum Design in Engineering." In Intelligent Educational Machines. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-44921-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jezequel, Jean-Marc. "Building a global time on parallel machines." In Distributed Algorithms. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51687-5_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Magoulès, Frédéric, and Hai-Xiang Zhao. "Model Reduction for Support Vector Machines." In Data Mining and Machine Learning in Building Energy Analysis. John Wiley & Sons, Inc., 2016. http://dx.doi.org/10.1002/9781118577691.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Magoulès, Frédéric, and Hai-Xiang Zhao. "Parallel Computing for Support Vector Machines." In Data Mining and Machine Learning in Building Energy Analysis. John Wiley & Sons, Inc., 2016. http://dx.doi.org/10.1002/9781118577691.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Building machines and gadgerty"

1

Ellery, Alex. "Building physical self-replicating machines." In Proceedings of the 14th European Conference on Artificial Life ECAL 2017. MIT Press, 2017. http://dx.doi.org/10.7551/ecal_a_026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Telleria, Maria. "Building Machines that Empower Humans." In SIGITE '20: The 21st Annual Conference on Information Technology Education. ACM, 2020. http://dx.doi.org/10.1145/3368308.3416901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Augugliaro, Federico, Ammar Mirjan, Fabio Gramazio, Matthias Kohler, and Raffaello D'Andrea. "Building tensile structures with flying machines." In 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2013). IEEE, 2013. http://dx.doi.org/10.1109/iros.2013.6696853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mauduit, N., M. Duranton, J. Gobert, and J. A. Sirat. "Building up neuromimetic machines with LNeuro 1.0." In 1991 IEEE International Joint Conference on Neural Networks. IEEE, 1991. http://dx.doi.org/10.1109/ijcnn.1991.170466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnsen, Carl-Johannes, and Kenneth Skovhede. "Building FPGA State Machines from Sequential Code." In FPGA '19: The 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. ACM, 2019. http://dx.doi.org/10.1145/3289602.3293965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Giroux, Raymond Paul. "Building Hoover Dam (Men, Machines, and Methods)." In Hoover Dam 75th Anniversary History Symposium. American Society of Civil Engineers, 2010. http://dx.doi.org/10.1061/41141(390)20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Giroux, Raymond Paul. "Building the Panama Canal (Men, Machines, and Methods)." In ASCE Global Engineering Conference 2014. American Society of Civil Engineers, 2014. http://dx.doi.org/10.1061/9780784413739.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Fang Cherry, Fu Shen, Duen Horng Chau, Neil Bright, and Mehmet Belgin. "Building a research data science platform from industrial machines." In 2016 IEEE International Conference on Big Data (Big Data). IEEE, 2016. http://dx.doi.org/10.1109/bigdata.2016.7840859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chari, Guido, Diego Garbervetsky, and Stefan Marr. "Building efficient and highly run-time adaptable virtual machines." In SPLASH '16: Conference on Systems, Programming, Languages, and Applications: Software for Humanity. ACM, 2016. http://dx.doi.org/10.1145/2989225.2989234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

HAKA, Aydan, Rusen VASILEV, Veneta ALEKSIEVA, and Hristo VALCHANOV. "Simulation Framework for Building of 6LoWPAN Network." In 2019 16th Conference on Electrical Machines, Drives and Power Systems (ELMA). IEEE, 2019. http://dx.doi.org/10.1109/elma.2019.8771633.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Building machines and gadgerty"

1

KOCH, CHRISTOF. Final Report of LDRD Project Number 34693: Building Conscious Machines Based Upon the Architecture of Visual Cortex in the Primate Brain. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/808594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!