Search Results - (((((((ant OR wanted) OR semantics) OR arts) OR cantor) OR anne) OR maarten) OR mantis) algorithms.

Search alternatives:

  1. 281

    Modelling for coastal hydraulics and engineering by Chau, Kwok Wing

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  2. 282

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  3. 283

    Smart buildings, smart communities and demand response

    Published 2021
    Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
    Full text (MFA users only)
    Electronic eBook
  4. 284
  5. 285

    Evolutionary optimization

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  6. 286

    Big Data and HPC. by Grandinetti, L.

    Published 2018
    Table of Contents: “…Analysis and Design of IoT Based Physical Location Monitoring SystemAutonomous Task Scheduling for Fast Big Data Processing; Adaptive Resource Management for Distributed Data Analytics; HPC Challenges; High-Performance Massive Subgraph Counting Using Pipelined Adaptive-Group Communication; Final Parallel and Distributed Computing Assignment for Master Students: Description of the Properties and Parallel Structure of Algorithms; Parallel Motion Estimation Based on GPU and Combined GPU-CPU; GPU-Based Iterative Hill Climbing Algorithm to Solve Symmetric Traveling Salesman Problem.…”
    Full text (MFA users only)
    Electronic eBook
  7. 287
  8. 288
  9. 289

    Iaeng transactions on electrical engineering. Vol. 1, Special issue of the International Multiconference of Engineers and Computer Scientists 2012

    Published 2013
    Table of Contents: “…Pawar -- Web services for chronic pain monitoring / Nuno Goncalo Coelho Costa Pombo, Pedro Jose Guerra de Araujo and Joaquim Manuel Vieira da Silva Viana -- Parallel binomial American option pricing on CPU-GPU hybrid platform / Nan Zhang, Chi-Un Lei and Ka Lok Man -- The subsystem grouping scheme using use case dependency graph and domain-specific semantic model for large complex systems / Nanchaya Khrueahong and Wiwat Vatanawood -- MOBM: a methodology for building practical domain ontologies from database information / Minyoung Ra [and others] -- A trial of the dynamic weighted sum method for multi-objective optimization / Hong Zhang -- A multi-agent platform to manage distributed and heterogeneous knowledge by using semantic web / Inaya Lahoud [and others] -- An intelligent train marshaling based on the processing time considering group layout of freight cars / Yoichi Hirashima -- A web-based multilingual intelligent tutor system based on Jackson's learning styles profiler and expert systems / H. …”
    Full text (MFA users only)
    Electronic eBook
  10. 290

    Large Aperture Array Radar Systems for Automotive Applications. by Schwartau, Fabian

    Published 2021
    Table of Contents: “…Optimization Algorithm -- Final Design -- Array Analysis -- Link-Budget -- Signal Processing Flow -- Summary -- 3.1 State of the Art -- 3.2 Requirements -- 3.3 Array Design -- 3.4 Array Analysis -- 3.5 Link-Budget -- 3.6 Signal Processing Flow -- 3.7 Summary -- Synchronization Demonstrator -- Hardware and Concept -- Radar Chips -- Module Hardware -- Module Synchronization -- Antenna Elements and Array -- Calibration -- System Parameters, Software and Signal Processing -- Simulations, Measurements and Results -- Summary -- 4.1 Hardware and Concept -- 4.2 Calibration…”
    Full text (MFA users only)
    Electronic eBook
  11. 291

    Algebraic Multigrid for the Multi-Ion Transport and Reaction Model - a Physics-Aware Approach by Thum, Peter

    Published 2013
    Table of Contents: “…4.5 Sorting Algorithms4.6 Scalar Example; 4.7 Reordering Framework for the MITReM; 5 The Heuristic Peclet Number; 5.1 Heuristic Peclet Number for Scalar Equations; 5.2 Heuristic Peclet Number for Systems of PDEs; 6 A Physics-Aware Point-Based AMG Approach (PAMG) for the Migration-Diffusion System; 6.1 The Migration-Diffusion System; 6.2 State-of-the-Art PAMG Approaches; 6.3 The Physics-Aware Primary Matrix; 6.4 PAMG for a Locally Violated Peclet Condition; 6.5 The Final Physics-Aware PAMG Approach; 7 A Physics-Aware PAMG Approach for the MITReM; 7.1 The MITReM System…”
    Full text (MFA users only)
    Electronic eBook
  12. 292

    Aggregating Dialectology, Typology, and Register Analysis : Linguistic Variation in Text and Speech

    Published 2014
    Table of Contents: “…Kretzschmar -- A weakly supervised multivariate approach to the study of language variation / Sascha Diwersy, Stefan Evert, and Stella Neumann -- Semantic weighting mechanisms in scalable lexical sociolectometry / Tom Ruette, Dirk Geeraerts, Yves Peirsman and Dirk Speelman -- Temperature in the word space : Sense exploration of temperature expressions using word-space modelling / Maria Koptjevskaja-Tamm and Magnus Sahlgren -- The perfect map : Investigating the cross-linguistic distribution of TAME categories in a parallel corpus / Östen Dahl -- Explorations into variation across Slavic : Taking a bottom-up approach / Ruprecht von Waldenfels -- Where Alice fell into : Motion events from a parallel corpus / Annemarie Verkerk -- Algorithmic typology and going from known to similar unknown categories within and across languages / Bernhard Wälchli -- Inducing place distinctions of consonants from their distribution in words / Thomas Mayer -- Laws of language and text in quantitative and synergetic linguistics / Reinhard Köhler.…”
    Full text (MFA users only)
    Electronic eBook
  13. 293
  14. 294

    Meeting security challenges through data analytics and decision support

    Published 2016
    Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  15. 295

    Artificial intelligent techniques for electric and hybrid electric vehicles

    Published 2020
    Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
    Full text (MFA users only)
    Electronic eBook
  16. 296

    Conversations on violence : an anthology

    Published 2021
    Table of Contents: “…The Violence of the Algorithm -- Davide Panagia -- 14. Thinking Art in a Decolonial Way -- Lewis Gordon -- 15. …”
    Full text (MFA users only)
    Electronic eBook
  17. 297

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  18. 298
  19. 299

    Methodological and analytic frontiers in lexical research

    Published 2012
    Table of Contents: “…Behavioral profiles: A fine-grained and quantitative approach in corpus-based lexical semantics (by Gries, Stefan Th.); 5. 5. Using a maze task to track lexical and sentence processing (by Forster, Kenneth I.); 6. 6. …”
    Full text (MFA users only)
    Electronic eBook
  20. 300

    Advances in portfolio construction and implementation

    Published 2003
    Table of Contents: “…Using genetic algorithms to construct portfolios; 6.1 Limitations of Traditional Mean-Variance Portfolio Optimization; 6.2 Selecting a Method to Limit the Number of Securities in the Final Portfolio; 6.3 Practical Construction of a Genetic Algorithm-Based Optimizer; 6.4 Performance of Genetic Algorithm; 6.5 Conclusions; References; Chapter 7. …”
    Full text (MFA users only)
    Electronic eBook