Search Results - (((((((ant OR art) OR wind) OR altern) OR cantor) OR anne) OR vian) OR halten) algorithms.

Refine Results
  1. 1

    Ant Colony Optimization and Constraint Programming. by Solnon, Christine

    Published 2013
    Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    Theory of randomized search heuristics : foundations and recent developments

    Published 2011
    Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4

    How to guard an art gallery and other discrete mathematical adventures by Michael, T. S., 1960-

    Published 2009
    Table of Contents: “…s Formula: Second Proof -- 2.8 Batting Averages and Lattice Points -- 2.9 Three Dimensions and N-largements -- 2.10 Notes and References -- 2.11 Problems -- 3 How to Guard an Art Gallery -- 3.1 The Sunflower Art Gallery -- 3.2 Art Gallery Problems -- 3.3 The Art Gallery Theorem -- 3.4 Colorful Consequences -- 3.5 Triangular and Chromatic Assumptions -- 3.6 Modern Art Galleries -- 3.7 Art Gallery Sketches -- 3.8 Right-Angled Art Galleries -- 3.9 Guarding the Guards -- 3.10 Three Dimensions and the Octoplex…”
    Full text (MFA users only)
    Electronic eBook
  5. 5

    Offshore wind energy technology by Anaya-Lara, Olimpo, Tande, John O., 1962-, Uhlen, Kjetil, 1961-, Merz, Karl, 1978-

    Published 2018
    Table of Contents: “…2.6 Power Electronic Converters for MW Wind Turbine Generators2.7 Wind Generators Compared to Conventional Power Plant; 2.8 Acknowledgements; 2.9 References; 3 Modelling and Analysis of Drivetrains in Offshore Wind Turbines; 3.1 Introduction; 3.2 Drivetrain Concepts; 3.3 Gearbox Failures; 3.4 State-of-the-art Wind Turbine Gearbox Design Codes; 3.5 Drivetrain Modelling and Analysis; 3.6 Limit State Design; 3.7 Drivetrains in Floating Wind Turbines; 3.8 Condition Monitoring and Inspection; 3.9 Drivetrains in Fault Conditions; 3.10 5-MW Reference Offshore Drivetrain; 3.11 References.…”
    Full text (MFA users only)
    Electronic eBook
  6. 6

    The Human Algorithm by Solis, Brian

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  7. 7
  8. 8

    Nature-inspired optimization algorithms by Yang, Xin-She

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  9. 9

    Open Data Structures : an Introduction. by Morin, Pat

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  10. 10
  11. 11

    Ant colony optimization by Dorigo, Marco

    Published 2004
    Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  12. 12
  13. 13

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  14. 14

    The multilevel fast multipole algorithm (MLFMA) for solving large-scale computational electromagnetics problems by Ergül, Özgür

    Published 2014
    Table of Contents: “…1.9.3 Complex-Source-Point Excitation1.9.4 Delta-Gap Excitation; 1.9.5 Current-Source Excitation; 1.10 Multilevel Fast Multipole Algorithm; 1.11 Low-Frequency Breakdown of MLFMA; 1.12 Iterative Algorithms; 1.12.1 Symmetric Lanczos Process; 1.12.2 Nonsymmetric Lanczos Process; 1.12.3 Arnoldi Process; 1.12.4 Golub-Kahan Process; 1.13 Preconditioning; 1.14 Parallelization of MLFMA; Chapter 2 Solutions of Electromagnetics Problems with Surface Integral Equations; 2.1 Homogeneous Dielectric Objects; 2.1.1 Surface Integral Equations; 2.1.2 Surface Formulations.…”
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Swarm Intelligence Algorithms : Modifications and Applications. by Slowik, Adam

    Published 2020
    Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
    Full text (MFA users only)
    Electronic eBook
  16. 16
  17. 17
  18. 18

    Machine Learning Algorithms and Applications. by Srinivas, Mettu

    Published 2021
    Table of Contents: “…2.4 Dataset Generation -- 2.5 Results -- 2.6 Conclusion -- Acknowledgment -- References -- 3 A Wind Speed Prediction System Using Deep Neural Networks -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Results and Discussions -- 3.4 Conclusion -- References -- 4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Preliminaries -- 4.4 Proposed Model -- 4.5 Experiments -- 4.6 Results -- 4.7 Conclusion -- References -- 5 Sakshi Aggarwal, Navjot Singh and K.K. …”
    Full text (MFA users only)
    Electronic eBook
  19. 19

    Security of block ciphers : from algorithm design to hardware implementation by Sakiyama, Kazuo, 1971-

    Published 2015
    Table of Contents: “…Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults.…”
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Data Clustering : Algorithms and Applications. by Aggarwal, Charu C.

    Published 2013
    Table of Contents: “…Chapter 12: Clustering Categorical DataChapter 13: Document Clustering: The Next Frontier; Chapter 14 : Clustering Multimedia Data; Chapter 15: Time-Series Data Clustering; Chapter 16: Clustering Biological Data; Chapter 17: Network Clustering; Chapter 18: A Survey of Uncertain Data Clustering Algorithms; Chapter 19: Concepts of Visual and Interactive Clustering; Chapter 20: Semisupervised Clustering; Chapter 21: Alternative Clustering Analysis: A Review; Chapter 22 : Cluster Ensembles: Theory and Applications; Chapter 23: Clustering ValidationMeasures.…”
    Full text (MFA users only)
    Electronic eBook