Searching for identification : 117 results found | RSS Feed for this search

1 2 3 4 5

2.160 Identification, Estimation, and Learning (MIT) 2.160 Identification, Estimation, and Learning (MIT)

Description

This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation. This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation.

Subjects

system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification | system identification | estimation | estimation | least squares estimation | least squares estimation | Kalman filter | Kalman filter | noise dynamics | noise dynamics | system representation | system representation | function approximation theory | function approximation theory | neural nets | neural nets | radial basis functions | radial basis functions | wavelets | wavelets | volterra expansions | volterra expansions | informative data sets | informative data sets | persistent excitation | persistent excitation | asymptotic variance | asymptotic variance | central limit theorem | central limit theorem | model structure selection | model structure selection | system order estimate | system order estimate | maximum likelihood | maximum likelihood | unbiased estimates | unbiased estimates | Cramer-Rao lower bound | Cramer-Rao lower bound | Kullback-Leibler information distance | Kullback-Leibler information distance | Akaike?s information criterion | Akaike?s information criterion | experiment design | experiment design | model validation | model validation

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

24.500 Topics in Philosophy of Mind: Self-Knowledge (MIT) 24.500 Topics in Philosophy of Mind: Self-Knowledge (MIT)

Description

This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion. This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion.

Subjects

Philosophy | Philosophy | transparency | transparency | mind | mind | self-knowledge | self-knowledge | mental states | mental states | externalist | externalist | individualism | individualism | warrant transmission | warrant transmission | misidentification | misidentification | self-identification | self-identification | expressivism | expressivism | neo-expressivism | neo-expressivism

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-24.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Atlas Details: Antenna TIAS Installation; Back View Date: 02/07/1968 Atlas Details: Antenna TIAS Installation; Back View Date: 02/07/1968

Description

Subjects

airplane | airplane | aircraft | aircraft | aviation | aviation | ibm | ibm | ew | ew | a6 | a6 | intruder | intruder | militaryaviation | militaryaviation | pw | pw | radome | radome | tias | tias | navalaviation | navalaviation | prattwhitney | prattwhitney | sead | sead | internationalbusinessmachines | internationalbusinessmachines | electronicwarfare | electronicwarfare | ironhand | ironhand | j52 | j52 | a6intruder | a6intruder | grummana6intruder | grummana6intruder | a6b | a6b | suppressionofenemyairdefenses | suppressionofenemyairdefenses | aps118 | aps118 | grummanintruder | grummanintruder | grummana6 | grummana6 | prattwhitneyj52 | prattwhitneyj52 | grummana6bintruder | grummana6bintruder | a6bintruder | a6bintruder | pwj52 | pwj52 | grummana6b | grummana6b | aps118tias | aps118tias | aps118targetidentificationacquisitionsystem | aps118targetidentificationacquisitionsystem | ibmaps118 | ibmaps118 | targetidentificationacquisitionsystem | targetidentificationacquisitionsystem

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=49487266@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

24.500 Topics in Philosophy of Mind: Self-Knowledge (MIT) 24.500 Topics in Philosophy of Mind: Self-Knowledge (MIT)

Description

This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion. This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion.

Subjects

Philosophy | Philosophy | transparency | transparency | mind | mind | self-knowledge | self-knowledge | mental states | mental states | externalist | externalist | individualism | individualism | warrant transmission | warrant transmission | misidentification | misidentification | self-identification | self-identification | expressivism | expressivism | neo-expressivism | neo-expressivism

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

2.160 Identification, Estimation, and Learning (MIT) 2.160 Identification, Estimation, and Learning (MIT)

Description

This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation. This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation.

Subjects

system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification | system identification | estimation | estimation | least squares estimation | least squares estimation | Kalman filter | Kalman filter | noise dynamics | noise dynamics | system representation | system representation | function approximation theory | function approximation theory | neural nets | neural nets | radial basis functions | radial basis functions | wavelets | wavelets | volterra expansions | volterra expansions | informative data sets | informative data sets | persistent excitation | persistent excitation | asymptotic variance | asymptotic variance | central limit theorem | central limit theorem | model structure selection | model structure selection | system order estimate | system order estimate | maximum likelihood | maximum likelihood | unbiased estimates | unbiased estimates | Cramer-Rao lower bound | Cramer-Rao lower bound | Kullback-Leibler information distance | Kullback-Leibler information distance | Akaike?s information criterion | Akaike?s information criterion | experiment design | experiment design | model validation | model validation

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

16.888 Multidisciplinary System Design Optimization (MIT) 16.888 Multidisciplinary System Design Optimization (MIT)

Description

This course is mainly focused on the quantitative aspects of design and presents a unifying framework called "Multidisciplinary System Design Optimization" (MSDO). The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context, focusing on three aspects of the problem: (i) The multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is a version of this course (16.60s) offered through the MIT Professional Institute, targeted at professional engineers. This course is mainly focused on the quantitative aspects of design and presents a unifying framework called "Multidisciplinary System Design Optimization" (MSDO). The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context, focusing on three aspects of the problem: (i) The multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is a version of this course (16.60s) offered through the MIT Professional Institute, targeted at professional engineers.

Subjects

optimization | optimization | multidisciplinary design optimization | multidisciplinary design optimization | MDO | MDO | subsystem identification | subsystem identification | interface design | interface design | linear constrained optimization fomulation | linear constrained optimization fomulation | non-linear constrained optimization formulation | non-linear constrained optimization formulation | scalar optimization | scalar optimization | vector optimization | vector optimization | systems engineering | systems engineering | complex systems | complex systems | heuristic search methods | heuristic search methods | tabu search | tabu search | simulated annealing | simulated annealing | genertic algorithms | genertic algorithms | sensitivity | sensitivity | tradeoff analysis | tradeoff analysis | goal programming | goal programming | isoperformance | isoperformance | pareto optimality | pareto optimality | flowchart | flowchart | design vector | design vector | simulation model | simulation model | objective vector | objective vector | input | input | discipline | discipline | output | output | coupling | coupling | multiobjective optimization | multiobjective optimization | optimization algorithms | optimization algorithms | tradespace exploration | tradespace exploration | numerical techniques | numerical techniques | direct methods | direct methods | penalty methods | penalty methods | heuristic techniques | heuristic techniques | SA | SA | GA | GA | approximation methods | approximation methods | sensitivity analysis | sensitivity analysis | isoperformace | isoperformace | output evaluation | output evaluation | MSDO framework | MSDO framework

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Techniques for Studying Materials: Examination of an Artefact Techniques for Studying Materials: Examination of an Artefact

Description

This set of animations provides guidance in physically examining an artefact including vitrual examination of an artefact. From TLP: Examination of an Artefact This set of animations provides guidance in physically examining an artefact including vitrual examination of an artefact. From TLP: Examination of an Artefact

Subjects

artefact | artefact | manufactured article | manufactured article | component | component | examination | examination | material | material | identification | identification | polymer | polymer | metal | metal | alloy | alloy | ceramic | ceramic | composite | composite | DoITPoMS | DoITPoMS | University of Cambridge | University of Cambridge | animation | animation | corematerials | corematerials | ukoer | ukoer

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://core.materials.ac.uk/rss/doitpoms_animations.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

14.385 Nonlinear Econometric Analysis (MIT) 14.385 Nonlinear Econometric Analysis (MIT)

Description

This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications. This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications.

Subjects

nonlinear | nonlinear | econometric | econometric | analysis | analysis | generalized method of moments | generalized method of moments | GMM | GMM | maximum likelihood estimation | maximum likelihood estimation | MLE | MLE | minimum distance | minimum distance | extremum | extremum | large sample theory | large sample theory | asymptotic theory | asymptotic theory | discrete choice | discrete choice | censoring | censoring | sample selection | sample selection | bootstrap | bootstrap | subsampling | subsampling | finite-sample methods | finite-sample methods | quantile regression | quantile regression | QR | QR | distributional methods | distributional methods | Bayesian methods | Bayesian methods | quasi-Bayesian methods | quasi-Bayesian methods | bounds | bounds | partial identification | partial identification | weak instruments | weak instruments | many instruments | many instruments | instrumental variables | instrumental variables | nonparametric estimation | nonparametric estimation | semiparametric estimation | semiparametric estimation | treatment effects | treatment effects | nonlinear models | nonlinear models | panel data | panel data | economic modeling | economic modeling

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

2.161 Signal Processing: Continuous and Discrete (MIT) 2.161 Signal Processing: Continuous and Discrete (MIT)

Description

This course provides a solid theoretical foundation for the analysis and processing of experimental data, and real-time experimental control methods. Topics covered include spectral analysis, filter design, system identification, and simulation in continuous and discrete-time domains. The emphasis is on practical problems with laboratory exercises. This course provides a solid theoretical foundation for the analysis and processing of experimental data, and real-time experimental control methods. Topics covered include spectral analysis, filter design, system identification, and simulation in continuous and discrete-time domains. The emphasis is on practical problems with laboratory exercises.

Subjects

analysis and processing of experimental data; real-time experimental control methods; spectral analysis; filter design; system identification; simulation in continuous and discrete-time domains; MATLAB | analysis and processing of experimental data; real-time experimental control methods; spectral analysis; filter design; system identification; simulation in continuous and discrete-time domains; MATLAB | fast Fourier transform | fast Fourier transform | correlation function | correlation function | sampling | sampling | op-amps | op-amps | Chebyshev | Chebyshev | Laplace transform | Laplace transform | Butterworth | Butterworth | convolution | convolution | frequency response | frequency response | windowing | windowing | low-pass | low-pass | poles | poles | zeros | zeros

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

SP.776 Design for Demining (MIT) SP.776 Design for Demining (MIT)

Description

Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in 20,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Course work is Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in 20,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Course work is

Subjects

humanitarian demining | humanitarian demining | landmines | landmines | landmine detection | landmine detection | landmine removal | landmine removal | landmine disposal | landmine disposal | landmines in 80 countries | landmines in 80 countries | 20 | 000 civilian victims per year | 20 | 000 civilian victims per year | MIT Design for Demining | MIT Design for Demining | product design | product design | development process | development process | identification of needs | identification of needs | idea generation | idea generation | prototyping | prototyping | blast testing | blast testing | manufacture | manufacture | deployment | deployment | demining community | demining community | hand tools | hand tools | protective gear | protective gear | safety equipment | safety equipment | educational graphics | educational graphics | teaching materials | teaching materials | field trip | field trip | US Army base | US Army base | demining training | demining training

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

14.385 Nonlinear Econometric Analysis (MIT) 14.385 Nonlinear Econometric Analysis (MIT)

Description

This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications. This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications.

Subjects

nonlinear | nonlinear | econometric | econometric | analysis | analysis | generalized method of moments | generalized method of moments | GMM | GMM | maximum likelihood estimation | maximum likelihood estimation | MLE | MLE | minimum distance | minimum distance | extremum | extremum | large sample theory | large sample theory | asymptotic theory | asymptotic theory | discrete choice | discrete choice | censoring | censoring | sample selection | sample selection | bootstrap | bootstrap | subsampling | subsampling | finite-sample methods | finite-sample methods | quantile regression | quantile regression | QR | QR | distributional methods | distributional methods | Bayesian methods | Bayesian methods | quasi-Bayesian methods | quasi-Bayesian methods | bounds | bounds | partial identification | partial identification | weak instruments | weak instruments | many instruments | many instruments | instrumental variables | instrumental variables | nonparametric estimation | nonparametric estimation | semiparametric estimation | semiparametric estimation | treatment effects | treatment effects | nonlinear models | nonlinear models | panel data | panel data | economic modeling | economic modeling

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

HMS Sparrowhawk at sea HMS Sparrowhawk at sea

Description

Subjects

sea | sea | chimney | chimney | sky | sky | cloud | cloud | industry | industry | daylight | daylight | interesting | interesting | wire | wire | construction | construction | industrial | industrial | ship | ship | unitedkingdom | unitedkingdom | britain | britain | mark | mark | label | label | flag | flag | smoke | smoke | letters | letters | pipe | pipe | grain | grain | rail | rail | vessel | vessel | rope | rope | pole | pole | destroyer | destroyer | deck | deck | crew | crew | maritime | maritime | transportation | transportation | cylinder | cylinder | archives | archives | unusual | unusual | identification | identification | ww1 | ww1 | launch | launch | float | float | striking | striking | naval | naval | greatwar | greatwar | tyneside | tyneside | firstworldwar | firstworldwar | sinking | sinking | warship | warship | fascinating | fascinating | digitalimage | digitalimage | collision | collision | rivertyne | rivertyne | shipbuilding | shipbuilding | royalnavy | royalnavy | tyneandwear | tyneandwear | industrialheritage | industrialheritage | swanhunter | swanhunter | blackandwhitephotograph | blackandwhitephotograph | navalhistory | navalhistory | shipbuildingheritage | shipbuildingheritage | maritimeheritage | maritimeheritage | battleofjutland | battleofjutland | c1913 | c1913 | swanhunterwighamrichardson | swanhunterwighamrichardson | wallsendyard | wallsendyard | 1june1916 | 1june1916 | hmsbroke | hmsbroke | thebattleofjutland | thebattleofjutland | hmssparrowhawk | hmssparrowhawk | 12october1912 | 12october1912 | royalnavalvessel | royalnavalvessel | acastaclassdestroyer | acastaclassdestroyer

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

4.366 Advanced Projects in the Visual Arts: Personal Narrative (MIT) 4.366 Advanced Projects in the Visual Arts: Personal Narrative (MIT)

Description

This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure. This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure.

Subjects

movies | movies | filmmaking | filmmaking | digital video | digital video | storytelling | storytelling | modern art | modern art | media | media | computerized editing | computerized editing | personal story | personal story | emotional art | emotional art | Fluxus | Fluxus | Bill Viola | Bill Viola | digital representation | digital representation | story trajectory | story trajectory | character development | character development | verisimilitude | verisimilitude | time-space continuity | time-space continuity | viewer identification | viewer identification | suspension of disbelief | suspension of disbelief | closure | closure | narrative cinema | narrative cinema | speculative biography | speculative biography | conceptual video | conceptual video | the fake | the fake | the remake | the remake | domestic ethnography | domestic ethnography

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

24.120 Moral Psychology (MIT) 24.120 Moral Psychology (MIT)

Description

This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course. This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course.

Subjects

action | action | motivation | motivation | social psychology | social psychology | sociology | sociology | belief | belief | desire | desire | moral motivation | moral motivation | sympathy | sympathy | empathy | empathy | intention | intention | will | will | addiction | addiction | resolution | resolution | rationality | rationality | identification | identification | autonomy | autonomy | egoism | egoism | altruism | altruism | intentions | intentions | Humean theory of motivation | Humean theory of motivation | willing | willing | wanting | wanting | waiting | waiting | weakness | weakness | Akrasia | Akrasia | self-control | self-control | temptation | temptation | self-regulation | self-regulation | free will | free will | self-deception | self-deception | moral psychology | moral psychology | empirical work | empirical work | autism | autism | ethical judgment | ethical judgment | moral luck | moral luck | virtue | virtue

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-24.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Trolleybus heading past Grey's Monument Trolleybus heading past Grey's Monument

Description

Subjects

newcastleupontyne | newcastleupontyne | 1960s | 1960s | tyneside | tyneside | northeastengland | northeastengland | cars | cars | greysmonument | greysmonument | traffic | traffic | architecture | architecture | historic | historic | interesting | interesting | bus | bus | trolleybus | trolleybus | streetscene | streetscene | blackandwhitephotograph | blackandwhitephotograph | digitalimage | digitalimage | industry | industry | industrialheritage | industrialheritage | city | city | buildings | buildings | monument | monument | scenicviewsofnewcastle | scenicviewsofnewcastle | fantastic | fantastic | unusual | unusual | fascinating | fascinating | impressive | impressive | roundabout | roundabout | road | road | daylight | daylight | vehicles | vehicles | reflection | reflection | body | body | glass | glass | wheel | wheel | seat | seat | driver | driver | pot | pot | plants | plants | debris | debris | letters | letters | signage | signage | sky | sky | cloud | cloud | land | land | ground | ground | turnersltd | turnersltd | photography | photography | localbusinesses | localbusinesses | premises | premises | services | services | economy | economy | consumerism | consumerism | transportation | transportation | archives | archives | northeastofengland | northeastofengland | unitedkingdom | unitedkingdom | pedestrian | pedestrian | wire | wire | post | post | street | street | door | door | wall | wall | roof | roof | heritage | heritage | curve | curve | light | light | turning | turning | movement | movement | number | number | identification | identification | destination | destination | dirt | dirt | disguise | disguise | rider | rider | plate | plate | construction | construction

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

12.114 Field Geology I (MIT) 12.114 Field Geology I (MIT)

Description

The course provides students with (1) an introduction to the geologic history of western North America, with particular emphasis on our field camp location and (2) an introduction to both digital and traditional techniques of geological field study. The weather permitting, several weekend field exercises provide practical experience in preparation for Field Geology II (12.115). It presents introductory material on the regional geology of the locale of 12.115. The course provides students with (1) an introduction to the geologic history of western North America, with particular emphasis on our field camp location and (2) an introduction to both digital and traditional techniques of geological field study. The weather permitting, several weekend field exercises provide practical experience in preparation for Field Geology II (12.115). It presents introductory material on the regional geology of the locale of 12.115.

Subjects

geologic mapping | geologic mapping | geologic mapping techniques | geologic mapping techniques | field geology | field geology | science writing | science writing | rock identification | rock identification | rock classification | rock classification | regional geology | regional geology | North American geology | North American geology | regional tectonics | regional tectonics | geologic maps | geologic maps | GIS | GIS | digital mapping | digital mapping | ESRI Arc Applications | ESRI Arc Applications | iPAQ handheld computers | iPAQ handheld computers | field manual | field manual | Western US geology | Western US geology | lithologic and structural symbology | lithologic and structural symbology

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

24.120 Moral Psychology (MIT) 24.120 Moral Psychology (MIT)

Description

This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course. This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course.

Subjects

action | action | motivation | motivation | social psychology | social psychology | sociology | sociology | belief | belief | desire | desire | moral motivation | moral motivation | sympathy | sympathy | empathy | empathy | intention | intention | will | will | addiction | addiction | resolution | resolution | rationality | rationality | identification | identification | autonomy | autonomy | egoism | egoism | altruism | altruism | intentions | intentions | Humean theory of motivation | Humean theory of motivation | willing | willing | wanting | wanting | waiting | waiting | weakness | weakness | Akrasia | Akrasia | self-control | self-control | temptation | temptation | self-regulation | self-regulation | free will | free will | self-deception | self-deception | moral psychology | moral psychology | empirical work | empirical work | autism | autism | ethical judgment | ethical judgment | moral luck | moral luck | virtue | virtue

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)

Description

6.034 is the header course for the department's "Artificial Intelligence and Applications" concentration. This course introduces students to the basic knowledge representation, problem solving, and learning methods of artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective. 6.034 is the header course for the department's "Artificial Intelligence and Applications" concentration. This course introduces students to the basic knowledge representation, problem solving, and learning methods of artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.

Subjects

artificial intelligence | artificial intelligence | applied systems | applied systems | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systems

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)

Description

This course introduces students to the basic knowledge representation, problem solving, and learning methods of  artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Technical RequirementsJava® plug-in software is required to run the .jar files found on this course site.Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries. This course introduces students to the basic knowledge representation, problem solving, and learning methods of  artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Technical RequirementsJava® plug-in software is required to run the .jar files found on this course site.Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries.

Subjects

artificial intelligence | artificial intelligence | applied systems | applied systems | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systems

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

4.366 Advanced Projects in the Visual Arts: Personal Narrative (MIT) 4.366 Advanced Projects in the Visual Arts: Personal Narrative (MIT)

Description

This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure. This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure.

Subjects

movies | movies | filmmaking | filmmaking | digital video | digital video | storytelling | storytelling | modern art | modern art | media | media | computerized editing | computerized editing | personal story | personal story | emotional art | emotional art | Fluxus | Fluxus | Bill Viola | Bill Viola | digital representation | digital representation | story trajectory | story trajectory | character development | character development | verisimilitude | verisimilitude | time-space continuity | time-space continuity | viewer identification | viewer identification | suspension of disbelief | suspension of disbelief | closure | closure | narrative cinema | narrative cinema | speculative biography | speculative biography | conceptual video | conceptual video | the fake | the fake | the remake | the remake | domestic ethnography | domestic ethnography

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Mooring the tanker 'Spinanger' after launch Mooring the tanker 'Spinanger' after launch

Description

Subjects

roof | roof | chimney | chimney | sky | sky | cloud | cloud | building | building | men | men | industry | industry | window | window | glass | glass | hat | hat | metal | metal | stone | stone | wall | wall | standing | standing | river | river | boat | boat | cabin | cabin | iron | iron | industrial | industrial | ship | ship | hand | hand | arm | arm | crane | crane | head | head | timber | timber | steel | steel | parts | parts | flag | flag | coat | coat | debris | debris | pipe | pipe | platform | platform | bank | bank | rail | rail | plate | plate | vessel | vessel | rope | rope | cargo | cargo | structure | structure | riverwear | riverwear | pole | pole | suit | suit | deck | deck | soil | soil | crew | crew | pile | pile | frame | frame | porthole | porthole | mooring | mooring | letter | letter | trousers | trousers | mast | mast | identification | identification | shipyard | shipyard | waving | waving | attentive | attentive | tanker | tanker | fascinating | fascinating | digitalimage | digitalimage | sunderland | sunderland | bending | bending | shipbuilding | shipbuilding | moored | moored | shiplaunch | shiplaunch | wearside | wearside | unsual | unsual | blackandwhitephotograph | blackandwhitephotograph | northeastofengland | northeastofengland | maritimeheritage | maritimeheritage | northsands | northsands | northsandsshipyard | northsandsshipyard | jlthompsonsonsltd | jlthompsonsonsltd | northsandssunderland | northsandssunderland | spinanger | spinanger | 22october1957 | 22october1957

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Side Tank Engine for the Lagos Railway, Nigeria Side Tank Engine for the Lagos Railway, Nigeria

Description

Subjects

roof | roof | chimney | chimney | industry | industry | window | window | wheel | wheel | metal | metal | train | train | vent | vent | interesting | interesting | construction | construction | cabin | cabin | industrial | industrial | carriage | carriage | body | body | mark | mark | parts | parts | debris | debris | letters | letters | grain | grain | engineering | engineering | rail | rail | railway | railway | structure | structure | steam | steam | number | number | piston | piston | doorway | doorway | engines | engines | transportation | transportation | bolt | bolt | cylinder | cylinder | nigeria | nigeria | locomotive | locomotive | unusual | unusual | identification | identification | railways | railways | locomotives | locomotives | manufactured | manufactured | newcastleupontyne | newcastleupontyne | fascinating | fascinating | digitalimage | digitalimage | tankengine | tankengine | industrialheritage | industrialheritage | forthbanks | forthbanks | stationaryengines | stationaryengines | neutralbackground | neutralbackground | sepiaphotograph | sepiaphotograph | locomotiveengine | locomotiveengine | hawthornleslie | hawthornleslie | crownagents | crownagents | roberthawthorn | roberthawthorn | williamhawthorn | williamhawthorn | november1910 | november1910 | hawthornleslielocomotives | hawthornleslielocomotives | forthbanksworks | forthbanksworks | lagosrailway | lagosrailway | sidetankengines | sidetankengines | hawthornleslielocomotiveworks | hawthornleslielocomotiveworks | southnigeria | southnigeria

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata