Searching for identification : 145 results found | RSS Feed for this search
Description
This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation. This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation.Subjects
system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification | system identification | estimation | estimation | least squares estimation | least squares estimation | Kalman filter | Kalman filter | noise dynamics | noise dynamics | system representation | system representation | function approximation theory | function approximation theory | neural nets | neural nets | radial basis functions | radial basis functions | wavelets | wavelets | volterra expansions | volterra expansions | informative data sets | informative data sets | persistent excitation | persistent excitation | asymptotic variance | asymptotic variance | central limit theorem | central limit theorem | model structure selection | model structure selection | system order estimate | system order estimate | maximum likelihood | maximum likelihood | unbiased estimates | unbiased estimates | Cramer-Rao lower bound | Cramer-Rao lower bound | Kullback-Leibler information distance | Kullback-Leibler information distance | Akaike?s information criterion | Akaike?s information criterion | experiment design | experiment design | model validation | model validationLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion. This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion.Subjects
Philosophy | Philosophy | transparency | transparency | mind | mind | self-knowledge | self-knowledge | mental states | mental states | externalist | externalist | individualism | individualism | warrant transmission | warrant transmission | misidentification | misidentification | self-identification | self-identification | expressivism | expressivism | neo-expressivism | neo-expressivismLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-24.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
Subjects
airplane | airplane | aircraft | aircraft | aviation | aviation | ibm | ibm | ew | ew | a6 | a6 | intruder | intruder | militaryaviation | militaryaviation | pw | pw | radome | radome | tias | tias | navalaviation | navalaviation | prattwhitney | prattwhitney | sead | sead | internationalbusinessmachines | internationalbusinessmachines | electronicwarfare | electronicwarfare | ironhand | ironhand | j52 | j52 | a6intruder | a6intruder | grummana6intruder | grummana6intruder | a6b | a6b | suppressionofenemyairdefenses | suppressionofenemyairdefenses | aps118 | aps118 | grummanintruder | grummanintruder | grummana6 | grummana6 | prattwhitneyj52 | prattwhitneyj52 | grummana6bintruder | grummana6bintruder | a6bintruder | a6bintruder | pwj52 | pwj52 | grummana6b | grummana6b | aps118tias | aps118tias | aps118targetidentificationacquisitionsystem | aps118targetidentificationacquisitionsystem | ibmaps118 | ibmaps118 | targetidentificationacquisitionsystem | targetidentificationacquisitionsystemLicense
No known copyright restrictionsSite sourced from
http://api.flickr.com/services/feeds/photos_public.gne?id=49487266@N07&lang=en-us&format=rss_200Attribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataSP.601J Feminist Theory (MIT) SP.601J Feminist Theory (MIT)
Description
This course focuses on a range of theories of gender in modern life. In recent years, feminist scholars in a range of disciplines have challenged previously accepted notions of political theory such as the distinctions between public and private, the definitions of politics itself, the nature of citizenship, and the roles of women in civil society. In this course, we will examine different aspects of women's lives through the life cycle as seen from the vantage point of feminist theory. In addition, we will consider different ways of looking at power and political culture in modern societies, issues of race and class, poverty and welfare, and sexuality and morality. Acknowledgements The instructor would like to thank Lara Yeo for capturing notes and discussion questions in class. This course focuses on a range of theories of gender in modern life. In recent years, feminist scholars in a range of disciplines have challenged previously accepted notions of political theory such as the distinctions between public and private, the definitions of politics itself, the nature of citizenship, and the roles of women in civil society. In this course, we will examine different aspects of women's lives through the life cycle as seen from the vantage point of feminist theory. In addition, we will consider different ways of looking at power and political culture in modern societies, issues of race and class, poverty and welfare, and sexuality and morality. Acknowledgements The instructor would like to thank Lara Yeo for capturing notes and discussion questions in class.Subjects
Men | Men | Women | Women | Gender | Gender | Feminists | Feminists | Feminist Theory | Feminist Theory | Prostitution | Prostitution | Morality | Morality | Chromosomes | Chromosomes | gender identification | gender identification | work and family | work and family | welfare reform | welfare reform | paternity | paternity | maternity | maternity | divorce | divorce | globalization of women's labor | globalization of women's labor | pornography | pornography | internet | internet | military service | military service | race | race | class | class | 2008 election campaigns | 2008 election campaigns | body image | body image | discrimination | discrimination | date rape | date rape | rape | rape | domestic violence | domestic violence | females in sports | females in sports | embodied knowledge | embodied knowledge | sexuality | sexuality | politics of consent | politics of consent | international economics | international economics | exile and pride | exile and pride | curious feminist | curious feminist | don't call us out of name | don't call us out of name | theorizing feminisms | theorizing feminisms | undoing the silence | undoing the silence | sneaker production | sneaker production | intersectionality | intersectionality | contextualize | contextualize | historicize | historicizeLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)
Description
6.034 is the header course for the department's "Artificial Intelligence and Applications" concentration. This course introduces students to the basic knowledge representation, problem solving, and learning methods of artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective. 6.034 is the header course for the department's "Artificial Intelligence and Applications" concentration. This course introduces students to the basic knowledge representation, problem solving, and learning methods of artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Subjects
artificial intelligence | artificial intelligence | applied systems | applied systems | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systemsLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
This course is mainly focused on the quantitative aspects of design and presents a unifying framework called "Multidisciplinary System Design Optimization" (MSDO). The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context, focusing on three aspects of the problem: (i) The multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is a version of this course (16.60s) offered through the MIT Professional Institute, targeted at professional engineers. This course is mainly focused on the quantitative aspects of design and presents a unifying framework called "Multidisciplinary System Design Optimization" (MSDO). The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context, focusing on three aspects of the problem: (i) The multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is a version of this course (16.60s) offered through the MIT Professional Institute, targeted at professional engineers.Subjects
optimization | optimization | multidisciplinary design optimization | multidisciplinary design optimization | MDO | MDO | subsystem identification | subsystem identification | interface design | interface design | linear constrained optimization fomulation | linear constrained optimization fomulation | non-linear constrained optimization formulation | non-linear constrained optimization formulation | scalar optimization | scalar optimization | vector optimization | vector optimization | systems engineering | systems engineering | complex systems | complex systems | heuristic search methods | heuristic search methods | tabu search | tabu search | simulated annealing | simulated annealing | genertic algorithms | genertic algorithms | sensitivity | sensitivity | tradeoff analysis | tradeoff analysis | goal programming | goal programming | isoperformance | isoperformance | pareto optimality | pareto optimality | flowchart | flowchart | design vector | design vector | simulation model | simulation model | objective vector | objective vector | input | input | discipline | discipline | output | output | coupling | coupling | multiobjective optimization | multiobjective optimization | optimization algorithms | optimization algorithms | tradespace exploration | tradespace exploration | numerical techniques | numerical techniques | direct methods | direct methods | penalty methods | penalty methods | heuristic techniques | heuristic techniques | SA | SA | GA | GA | approximation methods | approximation methods | sensitivity analysis | sensitivity analysis | isoperformace | isoperformace | output evaluation | output evaluation | MSDO framework | MSDO frameworkLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata24.120 Moral Psychology (MIT) 24.120 Moral Psychology (MIT)
Description
The course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; virtues and character traits. The course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; virtues and character traits.Subjects
action | action | motivation | motivation | social psychology | social psychology | sociology | sociology | beleif | beleif | desire | desire | moral motivation | moral motivation | sympathy | sympathy | empathy | empathy | intention | intention | will | will | addiction | addiction | resolution | resolution | rationality | rationality | identification | identification | autonomy | autonomyLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataSP.776 Design for Demining (MIT) SP.776 Design for Demining (MIT)
Description
Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in 20,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Course work is Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in 20,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Course work isSubjects
humanitarian demining | humanitarian demining | landmines | landmines | landmine detection | landmine detection | landmine removal | landmine removal | landmine disposal | landmine disposal | landmines in 80 countries | landmines in 80 countries | 20 | 000 civilian victims per year | 20 | 000 civilian victims per year | MIT Design for Demining | MIT Design for Demining | product design | product design | development process | development process | identification of needs | identification of needs | idea generation | idea generation | prototyping | prototyping | blast testing | blast testing | manufacture | manufacture | deployment | deployment | demining community | demining community | hand tools | hand tools | protective gear | protective gear | safety equipment | safety equipment | educational graphics | educational graphics | teaching materials | teaching materials | field trip | field trip | US Army base | US Army base | demining training | demining trainingLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)
Description
This course introduces students to the basic knowledge representation, problem solving, and learning methods of  artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Technical RequirementsJava® plug-in software is required to run the .jar files found on this course site.Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries. This course introduces students to the basic knowledge representation, problem solving, and learning methods of  artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Technical RequirementsJava® plug-in software is required to run the .jar files found on this course site.Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries.Subjects
artificial intelligence | artificial intelligence | applied systems | applied systems | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systemsLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure. This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure.Subjects
movies | movies | filmmaking | filmmaking | digital video | digital video | storytelling | storytelling | modern art | modern art | media | media | computerized editing | computerized editing | personal story | personal story | emotional art | emotional art | Fluxus | Fluxus | Bill Viola | Bill Viola | digital representation | digital representation | story trajectory | story trajectory | character development | character development | verisimilitude | verisimilitude | time-space continuity | time-space continuity | viewer identification | viewer identification | suspension of disbelief | suspension of disbelief | closure | closure | narrative cinema | narrative cinema | speculative biography | speculative biography | conceptual video | conceptual video | the fake | the fake | the remake | the remake | domestic ethnography | domestic ethnographyLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
This course provides a solid theoretical foundation for the analysis and processing of experimental data, and real-time experimental control methods. Topics covered include spectral analysis, filter design, system identification, and simulation in continuous and discrete-time domains. The emphasis is on practical problems with laboratory exercises. This course provides a solid theoretical foundation for the analysis and processing of experimental data, and real-time experimental control methods. Topics covered include spectral analysis, filter design, system identification, and simulation in continuous and discrete-time domains. The emphasis is on practical problems with laboratory exercises.Subjects
analysis and processing of experimental data; real-time experimental control methods; spectral analysis; filter design; system identification; simulation in continuous and discrete-time domains; MATLAB | analysis and processing of experimental data; real-time experimental control methods; spectral analysis; filter design; system identification; simulation in continuous and discrete-time domains; MATLAB | fast Fourier transform | fast Fourier transform | correlation function | correlation function | sampling | sampling | op-amps | op-amps | Chebyshev | Chebyshev | Laplace transform | Laplace transform | Butterworth | Butterworth | convolution | convolution | frequency response | frequency response | windowing | windowing | low-pass | low-pass | poles | poles | zeros | zerosLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)
Description
This course introduces representations, techniques, and architectures used to build applied systems and to account for intelligence from a computational point of view. This course also explores applications of rule chaining, heuristic search, logic, constraint propagation, constrained search, and other problem-solving paradigms. In addition, it covers applications of decision trees, neural nets, SVMs and other learning paradigms. This course introduces representations, techniques, and architectures used to build applied systems and to account for intelligence from a computational point of view. This course also explores applications of rule chaining, heuristic search, logic, constraint propagation, constrained search, and other problem-solving paradigms. In addition, it covers applications of decision trees, neural nets, SVMs and other learning paradigms.Subjects
Introduces representations | techniques | and architectures used to build applied systems | Introduces representations | techniques | and architectures used to build applied systems | computational intelligence | computational intelligence | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | problem-solving paradigms | problem-solving paradigms | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | learning paradigms | learning paradigms | Speculations on the contributions of human vision and language systems to human intelligence | Speculations on the contributions of human vision and language systems to human intelligence | Meets with HST.947 spring only | Meets with HST.947 spring only | 4 Engineering Design Points | 4 Engineering Design PointsLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-6.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata12.114 Field Geology I (MIT) 12.114 Field Geology I (MIT)
Description
The course provides students with (1) an introduction to the geologic history of western North America, with particular emphasis on our field camp location and (2) an introduction to both digital and traditional techniques of geological field study. The weather permitting, several weekend field exercises provide practical experience in preparation for Field Geology II (12.115). It presents introductory material on the regional geology of the locale of 12.115. The course provides students with (1) an introduction to the geologic history of western North America, with particular emphasis on our field camp location and (2) an introduction to both digital and traditional techniques of geological field study. The weather permitting, several weekend field exercises provide practical experience in preparation for Field Geology II (12.115). It presents introductory material on the regional geology of the locale of 12.115.Subjects
geologic mapping | geologic mapping | geologic mapping techniques | geologic mapping techniques | field geology | field geology | science writing | science writing | rock identification | rock identification | rock classification | rock classification | regional geology | regional geology | North American geology | North American geology | regional tectonics | regional tectonics | geologic maps | geologic maps | GIS | GIS | digital mapping | digital mapping | ESRI Arc Applications | ESRI Arc Applications | iPAQ handheld computers | iPAQ handheld computers | field manual | field manual | Western US geology | Western US geology | lithologic and structural symbology | lithologic and structural symbologyLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-12.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata14.385 Nonlinear Econometric Analysis (MIT) 14.385 Nonlinear Econometric Analysis (MIT)
Description
This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications. This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications.Subjects
nonlinear | nonlinear | econometric | econometric | analysis | analysis | generalized method of moments | generalized method of moments | GMM | GMM | maximum likelihood estimation | maximum likelihood estimation | MLE | MLE | minimum distance | minimum distance | extremum | extremum | large sample theory | large sample theory | asymptotic theory | asymptotic theory | discrete choice | discrete choice | censoring | censoring | sample selection | sample selection | bootstrap | bootstrap | subsampling | subsampling | finite-sample methods | finite-sample methods | quantile regression | quantile regression | QR | QR | distributional methods | distributional methods | Bayesian methods | Bayesian methods | quasi-Bayesian methods | quasi-Bayesian methods | bounds | bounds | partial identification | partial identification | weak instruments | weak instruments | many instruments | many instruments | instrumental variables | instrumental variables | nonparametric estimation | nonparametric estimation | semiparametric estimation | semiparametric estimation | treatment effects | treatment effects | nonlinear models | nonlinear models | panel data | panel data | economic modeling | economic modelingLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata24.120 Moral Psychology (MIT) 24.120 Moral Psychology (MIT)
Description
This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course. This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course.Subjects
action | action | motivation | motivation | social psychology | social psychology | sociology | sociology | belief | belief | desire | desire | moral motivation | moral motivation | sympathy | sympathy | empathy | empathy | intention | intention | will | will | addiction | addiction | resolution | resolution | rationality | rationality | identification | identification | autonomy | autonomy | egoism | egoism | altruism | altruism | intentions | intentions | Humean theory of motivation | Humean theory of motivation | willing | willing | wanting | wanting | waiting | waiting | weakness | weakness | Akrasia | Akrasia | self-control | self-control | temptation | temptation | self-regulation | self-regulation | free will | free will | self-deception | self-deception | moral psychology | moral psychology | empirical work | empirical work | autism | autism | ethical judgment | ethical judgment | moral luck | moral luck | virtue | virtueLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-24.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
There is need for a rigorous, quantitative multidisciplinary design methodology that works with the non-quantitative and creative side of the design process in engineering systems. The goal of multidisciplinary systems design optimization is to create advanced and complex engineering systems that must be competitive not only in terms of performance, but also in terms of life-cycle value. The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context. Focus will be equally strong on all three aspects of the problem: (i) the multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is need for a rigorous, quantitative multidisciplinary design methodology that works with the non-quantitative and creative side of the design process in engineering systems. The goal of multidisciplinary systems design optimization is to create advanced and complex engineering systems that must be competitive not only in terms of performance, but also in terms of life-cycle value. The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context. Focus will be equally strong on all three aspects of the problem: (i) the multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization.Subjects
systems engineering | systems engineering | optimization | optimization | product design | product design | multidisciplinary design optimization | multidisciplinary design optimization | subsystem identification | subsystem identification | heuristic search methods | heuristic search methods | genetic algorithms | genetic algorithms | simulated annealing | simulated annealing | Pareto optimality | Pareto optimality | design for value | design for valueLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-ESD.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
Engineering systems design must have the flexibility to take advantage of new opportunities while avoiding disasters. This subject develops "real options" analysis to create design flexibility and measure its value so that it can be incorporated into system optimization. It builds on essential concepts of system models, decision analysis, and financial concepts. Emphasis is placed on calculating value of real options with special attention given to efficient analysis and practical applications. The material is organized and presented to deal with the contextual reality of technological systems, that substantially distinguishes the analysis of real options in engineering systems from that of financial options. Note This MIT OpenCourseWare site is based on the materials from Profes Engineering systems design must have the flexibility to take advantage of new opportunities while avoiding disasters. This subject develops "real options" analysis to create design flexibility and measure its value so that it can be incorporated into system optimization. It builds on essential concepts of system models, decision analysis, and financial concepts. Emphasis is placed on calculating value of real options with special attention given to efficient analysis and practical applications. The material is organized and presented to deal with the contextual reality of technological systems, that substantially distinguishes the analysis of real options in engineering systems from that of financial options. Note This MIT OpenCourseWare site is based on the materials from ProfesSubjects
real options | real options | flexibility | flexibility | flexible design | flexible design | engineering systems | engineering systems | complex projects | complex projects | evaluation over time | evaluation over time | risk | risk | uncertainty | uncertainty | valuation | valuation | timing | timing | uncertainty modeling | uncertainty modeling | flexibility valuation | flexibility valuation | methods | methods | design analysis | design analysis | lattice analysis | lattice analysis | monte carlo simulation | monte carlo simulation | flexibility identification. | flexibility identification.License
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-ESD.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataHST.947 Medical Artificial Intelligence (MIT) HST.947 Medical Artificial Intelligence (MIT)
Description
This course provides an intensive introduction to artificial intelligence and its applications to problems of medical diagnosis, therapy selection, and monitoring and learning from databases. It meets with lectures and recitations of 6.034 Artificial Intelligence, whose material is supplemented by additional medical-specific readings in a weekly discussion session. Students are responsible for completing all homework assignments in 6.034 and for additional problems and/or papers. This course provides an intensive introduction to artificial intelligence and its applications to problems of medical diagnosis, therapy selection, and monitoring and learning from databases. It meets with lectures and recitations of 6.034 Artificial Intelligence, whose material is supplemented by additional medical-specific readings in a weekly discussion session. Students are responsible for completing all homework assignments in 6.034 and for additional problems and/or papers.Subjects
Introduces representations | techniques | and architectures used to build applied systems | Introduces representations | techniques | and architectures used to build applied systems | computational intelligence | computational intelligence | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | problem-solving paradigms | problem-solving paradigms | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | learning paradigms | learning paradigms | Speculations on the contributions of human vision and language systems to human intelligence | Speculations on the contributions of human vision and language systems to human intelligence | Meets with HST.947 spring only | Meets with HST.947 spring only | 4 Engineering Design Points | 4 Engineering Design Points | artificial intelligence | artificial intelligence | applied systems | applied systems | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systems | diagnosis | diagnosis | clinical simulation | clinical simulation | genomics | genomics | proteomics | proteomics | bioinformatics | bioinformaticsLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses-HST.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allpersiancourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataEssentials of Medical Microbiology III - Part 1 of 2
Description
This presentation deals with the bacterial identification and provides an introduction into epidemiology. It provides information on the identification of bacteria including identification by physical attributes and the use of classical biochemical and staining techniques. This is concluded with a generalised introduction into epidemiology. A help file is included and should be read first.Subjects
microbiology | bacterial identification | epidemiology | bacilli | cocci | ziehl neelson stain | spores | fastidious bacteria | antibiotic resistance | identification | bacterial metabolism | catalase test | coagulase test | oxidase test | antigenic structure | genetic fingerprinting | strain differentiation | bioukoer | ukoer | Biological sciences | C000License
Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/Site sourced from
http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dcAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataEC.S06 Design for Demining (MIT) EC.S06 Design for Demining (MIT)
Description
Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in more than 10,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Cour Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in more than 10,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. CourSubjects
SP.776 | SP.776 | SP.786 | SP.786 | humanitarian demining | humanitarian demining | landmines | landmines | landmine detection | landmine detection | landmine removal | landmine removal | landmine disposal | landmine disposal | landmines in 80 countries | landmines in 80 countries | 20 | 000 civilian victims per year | 20 | 000 civilian victims per year | MIT Design for Demining | MIT Design for Demining | product design | product design | development process | development process | identification of needs | identification of needs | idea generation | idea generation | prototyping | prototyping | blast testing | blast testing | manufacture | manufacture | deployment | deployment | demining community | demining community | hand tools | hand tools | protective gear | protective gear | safety equipment | safety equipment | educational graphics | educational graphics | teaching materials | teaching materials | field trip | field trip | US Army base | US Army base | demining training | demining trainingLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataDescription
This mug shot comes from a police identification book believed to be from the 1930s. It was originally found in a junk shop by a member of the public and subsequently donated to Tyne & Wear Archives & Museums. No information is available to confirm which police force compiled it but evidence suggests it's from the Newcastle upon Tyne area. This image is part of the Tyne & Wear Archives & Museums set Newcastle upon Tyne criminals of the 1930?s. Accession no. DX1190 (Copyright) We're happy for you to share this digital image within the spirit of The Commons. Please cite 'Tyne & Wear Archives & Museums' when reusing. Certain restrictions on high quality reproductions and commercial use of the original physical version apply though; if you're unsure please email archives@twmuseums.org.ukSubjects
criminal | portrait | id | crime | tynewear | blackwhite | crimeandinvestigation | britishpolice | character | theft | larceny | petty | dodgy | unsavoury | crook | felon | illegal | conviction | lawandorder | cops | robbers | muir | socialhistory | blackandwhitephotograph | digitalimage | criminalrecord | publicrecords | documentation | archives | newcastleupontynecriminalsofthe1930s | newcastleupontyne | identification | identity | northeastofengland | unitedkingdom | text | information | personaldetails | mugshot | frederickbenedictmuir | man | cap | hat | button | neutralbackground | wall | suit | shirt | stripe | tie | cleanshaven | crease | labourer | publichousebreaking | shopbreaking | warehousebreaking | breakswindow | policeidentificationbook | 1930s | mysterious | engaging | interesting | unusual | fascinating | withdrawn | standing | side | face | hair | scaryLicense
No known copyright restrictionsSite sourced from
Tyne & Wear Archives & Museums | FlickRAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataMooring the tanker 'Spinanger' after launch Mooring the tanker 'Spinanger' after launch
Description
Subjects
roof | roof | chimney | chimney | sky | sky | cloud | cloud | building | building | men | men | industry | industry | window | window | glass | glass | hat | hat | metal | metal | stone | stone | wall | wall | standing | standing | river | river | boat | boat | cabin | cabin | iron | iron | industrial | industrial | ship | ship | hand | hand | arm | arm | crane | crane | head | head | timber | timber | steel | steel | parts | parts | flag | flag | coat | coat | debris | debris | pipe | pipe | platform | platform | bank | bank | rail | rail | plate | plate | vessel | vessel | rope | rope | cargo | cargo | structure | structure | riverwear | riverwear | pole | pole | suit | suit | deck | deck | soil | soil | crew | crew | pile | pile | frame | frame | porthole | porthole | mooring | mooring | letter | letter | trousers | trousers | mast | mast | identification | identification | shipyard | shipyard | waving | waving | attentive | attentive | tanker | tanker | fascinating | fascinating | digitalimage | digitalimage | sunderland | sunderland | bending | bending | shipbuilding | shipbuilding | moored | moored | shiplaunch | shiplaunch | wearside | wearside | unsual | unsual | blackandwhitephotograph | blackandwhitephotograph | northeastofengland | northeastofengland | maritimeheritage | maritimeheritage | northsands | northsands | northsandsshipyard | northsandsshipyard | jlthompsonsonsltd | jlthompsonsonsltd | northsandssunderland | northsandssunderland | spinanger | spinanger | 22october1957 | 22october1957License
No known copyright restrictionsSite sourced from
http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200Attribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata