Search Results - (((((((ant OR mantic) OR glantier) OR arts) OR cantor) OR anne) OR carter) OR hints) algorithms.

  1. 161
  2. 162

    Pattern Recognition in Computational Molecular Biology : Techniques and Approaches by Elloumi, Mourad, Iliopoulos, Costas, Wang, Jason T. L., Zomaya, Albert Y.

    Published 2015
    Table of Contents: “…Wiley Series; Title Page; Copyright; Table of Contents; List of Contributors; Preface; Part 1: Pattern Recognition in Sequences; Chapter 1: Combinatorial Haplotyping Problems; 1.1 Introduction; 1.2 Single Individual Haplotyping; 1.3 Population Haplotyping; References; Chapter 2: Algorithmic Perspectives of the String Barcoding Problems; 2.1 Introduction; 2.2 Summary of Algorithmic Complexity Results for Barcoding Problems; 2.3 Entropy-Based Information Content Technique for Designing Approximation Algorithms for String Barcoding Problems.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...

    Published 2013
    Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 166

    Key engineering materials

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Principles of artificial neural networks by Graupe, Daniel

    Published 2013
    Table of Contents: “…Fundamentals of biological neural networks -- ch. 3. Basic principles of ANNs and their early structures. 3.1. Basic principles of ANN design. 3.2. …”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  9. 169
  10. 170

    Learning OWL class expressions by Lehmann, Jens, 1982-

    Published 2010
    Table of Contents: “…Refinement Operator Based OWL Learning Algorithms; OCEL (OWL Class Expression Learner); Redundancy Elimination; Creating a Full Learning Algorithm; ELTL (EL Tree Learner)…”
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Insect media : an archaeology of animals and technology by Parikka, Jussi, 1976-

    Published 2010
    Table of Contents: “…Introduction: insects in the age of technology -- Nineteenth-century insect technics the uncanny affects of insects -- Genesis of form: insect architecture and swarms -- Technics of nature and temporality: Uexküll's ethology -- Metamorphosis, intensity, and devouring space: elements for an insect game theory -- Intermezzo -- Animal ensembles, robotic affects: bees, milieus, and individuation -- Biomorphs and boids: swarming algorithms -- Sexual selection in the biodigital: teknolust and the weird life of SRAs -- Epilogue insect media as an art of transmutation.…”
    Full text (MFA users only)
    Electronic eBook
  12. 172

    An Eulerian Discontinuous Galerkin Method for the Numerical Simulation of Interfacial Transport. by Kallendorf, Christina

    Published 2017
    Table of Contents: “…List of Figures; Nomenclature; List of Tables; Nomenclature; 1 Introduction; 2 Equations of the Physical Model; 3 State of the Art of Numerical Methods; 4 An Introduction to DG Methods; 5 New Conservation Laws of SurfaceTransport Equations; 6 Exact Solutions to the Interfacial Surfactant Transport Equation; 7 A Narrow Band Method for the Eulerian Approach; 8 The Eulerian DG Algorithm and Numerical Results; 9 Conclusion; A Appendix.…”
    Full text (MFA users only)
    Electronic eBook
  13. 173

    Optimization in polymer processing

    Published 2011
    Table of Contents: “…INTRODUCTION ; 2. STATE-OF-THE-ART ; 3. OPTIMIZATION METHODOLOGY.…”
    Full text (MFA users only)
    Electronic eBook
  14. 174

    Anaphora Resolution. by Mitkov, Ruslan

    Published 2014
    Table of Contents: “…4.1 Early work in anaphora resolution4.2 Student; 4.3 Shrdlu; 4.4 Lunar; 4.5 Hobbs's naïve approach; 4.5.1 The algorithm; 4.5.2 Evaluation of Hobbs' s algorithm; 4.6 The BFP algorithm; 4.7 Carter's shallow processing approach; 4.8 Rich and LuperFoy's distributed architecture; 4.9 Carbonell and Brown's multi-strategy approach; 4.10 Other work; 4.11 Summary; Chapter Five: The present: knowledge-poor and corpus-based approaches in the 1990s and beyond; 5.1 Main trends in recent anaphora resolution research; 5.2 Collocation patterns-based approach; 5.3 Lappin and Leass's algorithm; 5.3.1 Overview.…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015

    Published 2015
    Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 177
  18. 178

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Behavioral formation : volatile design processes & the emergence of a strange specificity by Snooks, Roland

    Published 2021
    Table of Contents: “…Intro -- ACKNOWLEDGMENTS -- PREFACE -- INTRODUCTION -- BEHAVIORAL METHODOLOGIES -- FIBROUS ASSEMBLAGES -- FIBROUS TOWER -- POLYSCALAR TECTONICS -- MULTI-AGENT ALGORITHMS -- AGENTBODIES -- BABIY YAR MEMORIAL -- MANIFOLD SWARMS -- RMIT MACE -- BEHAVIORAL COMPOSITES -- COMPOSITE SWARM -- COMPOSITE WING -- RMIT MEETING PAVILION -- AGENTBODY PROTOTYPES -- NGV PAVILION -- STRIATED POLYMERS -- VOLATILITY -- AGENCY OF STRUCTURE -- STRANGE FEEDBACK -- YEOSU PAVILION -- NATIONAL ART MUSEUM OF CHINA -- STRANGE SPECIFICITY -- PAINTERLY FORMATION -- STIGMERGIC ROBOTICS -- CATALOG OF PROJECTS -- GLOSSARY OF TERMS -- BIBLIOGRAPHY.…”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Optimization advances in electric power systems

    Published 2008
    Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
    Full text (MFA users only)
    Electronic eBook