Search Results - (((((((ant OR art) OR wind) OR altern) OR cantor) OR anne) OR vian) OR halten) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 55
- Mathematical models 50
- Artificial intelligence 35
- Machine learning 35
- Mathematics 34
- Mathematical optimization 28
- artificial intelligence 21
- Data mining 19
- Computer networks 17
- Algorithms 16
- algorithms 16
- methods 16
- Bioinformatics 15
- Computer simulation 15
- Design and construction 15
- Security measures 15
- Technological innovations 15
- Computational Biology 13
- Data Mining 13
- Digital techniques 13
- Neural networks (Computer science) 13
- Artificial Intelligence 12
- Information technology 12
- Management 12
- Computational biology 11
- Electronic data processing 11
- History 11
- Signal processing 11
- Social aspects 11
- Manufacturing processes 10
Search alternatives:
-
1
Ant Colony Optimization and Constraint Programming.
Published 2013Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
2
Theory of randomized search heuristics : foundations and recent developments
Published 2011Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
Full text (MFA users only)
Electronic eBook -
3
Flowchart and Algorithm Basics : The Art of Programming.
Published 2020Full text (MFA users only)
Electronic eBook -
4
How to guard an art gallery and other discrete mathematical adventures
Published 2009Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
Full text (MFA users only)
Electronic eBook -
5
Offshore wind energy technology
Published 2018Table of Contents: “…2.6 Power Electronic Converters for MW Wind Turbine Generators2.7 Wind Generators Compared to Conventional Power Plant; 2.8 Acknowledgements; 2.9 References; 3 Modelling and Analysis of Drivetrains in Offshore Wind Turbines; 3.1 Introduction; 3.2 Drivetrain Concepts; 3.3 Gearbox Failures; 3.4 State-of-the-art Wind Turbine Gearbox Design Codes; 3.5 Drivetrain Modelling and Analysis; 3.6 Limit State Design; 3.7 Drivetrains in Floating Wind Turbines; 3.8 Condition Monitoring and Inspection; 3.9 Drivetrains in Fault Conditions; 3.10 5-MW Reference Offshore Drivetrain; 3.11 References.…”
Full text (MFA users only)
Electronic eBook -
6
-
7
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
8
-
9
-
10
Swarm intelligence and bio-inspired computation : theory and applications
Published 2013Full text (MFA users only)
Electronic eBook -
11
Ant colony optimization
Published 2004Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
Full text (MFA users only)
Electronic eBook -
12
-
13
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
14
The multilevel fast multipole algorithm (MLFMA) for solving large-scale computational electromagnetics problems
Published 2014Table of Contents: “…1.9.3 Complex-Source-Point Excitation1.9.4 Delta-Gap Excitation; 1.9.5 Current-Source Excitation; 1.10 Multilevel Fast Multipole Algorithm; 1.11 Low-Frequency Breakdown of MLFMA; 1.12 Iterative Algorithms; 1.12.1 Symmetric Lanczos Process; 1.12.2 Nonsymmetric Lanczos Process; 1.12.3 Arnoldi Process; 1.12.4 Golub-Kahan Process; 1.13 Preconditioning; 1.14 Parallelization of MLFMA; Chapter 2 Solutions of Electromagnetics Problems with Surface Integral Equations; 2.1 Homogeneous Dielectric Objects; 2.1.1 Surface Integral Equations; 2.1.2 Surface Formulations.…”
Full text (MFA users only)
Electronic eBook -
15
Swarm Intelligence Algorithms : Modifications and Applications.
Published 2020Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
Full text (MFA users only)
Electronic eBook -
16
Structural geology algorithms : vectors and tensors
Published 2012Full text (MFA users only)
Electronic eBook -
17
Automatic defense against zero-day polymorphic worms in communication networks
Published 2013Full text (MFA users only)
Electronic eBook -
18
Machine Learning Algorithms and Applications.
Published 2021Table of Contents: “…2.4 Dataset Generation -- 2.5 Results -- 2.6 Conclusion -- Acknowledgment -- References -- 3 A Wind Speed Prediction System Using Deep Neural Networks -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Results and Discussions -- 3.4 Conclusion -- References -- 4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Preliminaries -- 4.4 Proposed Model -- 4.5 Experiments -- 4.6 Results -- 4.7 Conclusion -- References -- 5 Sakshi Aggarwal, Navjot Singh and K.K. …”
Full text (MFA users only)
Electronic eBook -
19
Security of block ciphers : from algorithm design to hardware implementation
Published 2015Table of Contents: “…Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults.…”
Full text (MFA users only)
Electronic eBook -
20
Data Clustering : Algorithms and Applications.
Published 2013Table of Contents: “…Chapter 12: Clustering Categorical DataChapter 13: Document Clustering: The Next Frontier; Chapter 14 : Clustering Multimedia Data; Chapter 15: Time-Series Data Clustering; Chapter 16: Clustering Biological Data; Chapter 17: Network Clustering; Chapter 18: A Survey of Uncertain Data Clustering Algorithms; Chapter 19: Concepts of Visual and Interactive Clustering; Chapter 20: Semisupervised Clustering; Chapter 21: Alternative Clustering Analysis: A Review; Chapter 22 : Cluster Ensembles: Theory and Applications; Chapter 23: Clustering ValidationMeasures.…”
Full text (MFA users only)
Electronic eBook