Search Results - (((((((ant OR wanted) OR semantics) OR arts) OR cantor) OR anne) OR maarten) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 52
- Artificial intelligence 47
- Mathematical models 44
- Machine learning 36
- Mathematics 29
- Data mining 27
- Mathematical optimization 27
- artificial intelligence 25
- Computer networks 18
- Artificial Intelligence 17
- Computer science 15
- Data Mining 15
- Python (Computer program language) 15
- Algorithms 14
- Technological innovations 14
- Information technology 13
- Computer simulation 12
- Machine Learning 12
- Management 12
- Neural networks (Computer science) 12
- algorithms 12
- Big data 11
- Development 11
- Digital techniques 11
- History 11
- Security measures 11
- Application software 10
- Bioinformatics 10
- Computational linguistics 10
- Electronic data processing 10
Search alternatives:
- semantics »
-
281
Modelling for coastal hydraulics and engineering
Published 2010Full text (MFA users only)
Electronic eBook -
282
Cryptography 101 : From Theory to Practice.
Published 2021Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
Full text (MFA users only)
Electronic eBook -
283
Smart buildings, smart communities and demand response
Published 2021Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
Full text (MFA users only)
Electronic eBook -
284
Mobile opportunistic networks : architectures, protocols and applications
Published 2011Full text (MFA users only)
Electronic eBook -
285
-
286
Big Data and HPC.
Published 2018Table of Contents: “…Analysis and Design of IoT Based Physical Location Monitoring SystemAutonomous Task Scheduling for Fast Big Data Processing; Adaptive Resource Management for Distributed Data Analytics; HPC Challenges; High-Performance Massive Subgraph Counting Using Pipelined Adaptive-Group Communication; Final Parallel and Distributed Computing Assignment for Master Students: Description of the Properties and Parallel Structure of Algorithms; Parallel Motion Estimation Based on GPU and Combined GPU-CPU; GPU-Based Iterative Hill Climbing Algorithm to Solve Symmetric Traveling Salesman Problem.…”
Full text (MFA users only)
Electronic eBook -
287
-
288
Wavelet Methods in Mathematical Analysis and Engineering.
Published 2010Full text (MFA users only)
Electronic eBook -
289
Iaeng transactions on electrical engineering. Vol. 1, Special issue of the International Multiconference of Engineers and Computer Scientists 2012
Published 2013Table of Contents: “…Pawar -- Web services for chronic pain monitoring / Nuno Goncalo Coelho Costa Pombo, Pedro Jose Guerra de Araujo and Joaquim Manuel Vieira da Silva Viana -- Parallel binomial American option pricing on CPU-GPU hybrid platform / Nan Zhang, Chi-Un Lei and Ka Lok Man -- The subsystem grouping scheme using use case dependency graph and domain-specific semantic model for large complex systems / Nanchaya Khrueahong and Wiwat Vatanawood -- MOBM: a methodology for building practical domain ontologies from database information / Minyoung Ra [and others] -- A trial of the dynamic weighted sum method for multi-objective optimization / Hong Zhang -- A multi-agent platform to manage distributed and heterogeneous knowledge by using semantic web / Inaya Lahoud [and others] -- An intelligent train marshaling based on the processing time considering group layout of freight cars / Yoichi Hirashima -- A web-based multilingual intelligent tutor system based on Jackson's learning styles profiler and expert systems / H. …”
Full text (MFA users only)
Electronic eBook -
290
Large Aperture Array Radar Systems for Automotive Applications.
Published 2021Table of Contents: “…Optimization Algorithm -- Final Design -- Array Analysis -- Link-Budget -- Signal Processing Flow -- Summary -- 3.1 State of the Art -- 3.2 Requirements -- 3.3 Array Design -- 3.4 Array Analysis -- 3.5 Link-Budget -- 3.6 Signal Processing Flow -- 3.7 Summary -- Synchronization Demonstrator -- Hardware and Concept -- Radar Chips -- Module Hardware -- Module Synchronization -- Antenna Elements and Array -- Calibration -- System Parameters, Software and Signal Processing -- Simulations, Measurements and Results -- Summary -- 4.1 Hardware and Concept -- 4.2 Calibration…”
Full text (MFA users only)
Electronic eBook -
291
Algebraic Multigrid for the Multi-Ion Transport and Reaction Model - a Physics-Aware Approach
Published 2013Table of Contents: “…4.5 Sorting Algorithms4.6 Scalar Example; 4.7 Reordering Framework for the MITReM; 5 The Heuristic Peclet Number; 5.1 Heuristic Peclet Number for Scalar Equations; 5.2 Heuristic Peclet Number for Systems of PDEs; 6 A Physics-Aware Point-Based AMG Approach (PAMG) for the Migration-Diffusion System; 6.1 The Migration-Diffusion System; 6.2 State-of-the-Art PAMG Approaches; 6.3 The Physics-Aware Primary Matrix; 6.4 PAMG for a Locally Violated Peclet Condition; 6.5 The Final Physics-Aware PAMG Approach; 7 A Physics-Aware PAMG Approach for the MITReM; 7.1 The MITReM System…”
Full text (MFA users only)
Electronic eBook -
292
Aggregating Dialectology, Typology, and Register Analysis : Linguistic Variation in Text and Speech
Published 2014Table of Contents: “…Kretzschmar -- A weakly supervised multivariate approach to the study of language variation / Sascha Diwersy, Stefan Evert, and Stella Neumann -- Semantic weighting mechanisms in scalable lexical sociolectometry / Tom Ruette, Dirk Geeraerts, Yves Peirsman and Dirk Speelman -- Temperature in the word space : Sense exploration of temperature expressions using word-space modelling / Maria Koptjevskaja-Tamm and Magnus Sahlgren -- The perfect map : Investigating the cross-linguistic distribution of TAME categories in a parallel corpus / Östen Dahl -- Explorations into variation across Slavic : Taking a bottom-up approach / Ruprecht von Waldenfels -- Where Alice fell into : Motion events from a parallel corpus / Annemarie Verkerk -- Algorithmic typology and going from known to similar unknown categories within and across languages / Bernhard Wälchli -- Inducing place distinctions of consonants from their distribution in words / Thomas Mayer -- Laws of language and text in quantitative and synergetic linguistics / Reinhard Köhler.…”
Full text (MFA users only)
Electronic eBook -
293
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
294
Meeting security challenges through data analytics and decision support
Published 2016Table of Contents: “…Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
295
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
296
Conversations on violence : an anthology
Published 2021Table of Contents: “…The Violence of the Algorithm -- Davide Panagia -- 14. Thinking Art in a Decolonial Way -- Lewis Gordon -- 15. …”
Full text (MFA users only)
Electronic eBook -
297
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook -
298
Fast sequential Monte Carlo methods for counting and optimization
Published 2013Full text (MFA users only)
Electronic eBook -
299
Methodological and analytic frontiers in lexical research
Published 2012Table of Contents: “…Behavioral profiles: A fine-grained and quantitative approach in corpus-based lexical semantics (by Gries, Stefan Th.); 5. 5. Using a maze task to track lexical and sentence processing (by Forster, Kenneth I.); 6. 6. …”
Full text (MFA users only)
Electronic eBook -
300
Advances in portfolio construction and implementation
Published 2003Table of Contents: “…Using genetic algorithms to construct portfolios; 6.1 Limitations of Traditional Mean-Variance Portfolio Optimization; 6.2 Selecting a Method to Limit the Number of Securities in the Final Portfolio; 6.3 Practical Construction of a Genetic Algorithm-Based Optimizer; 6.4 Performance of Genetic Algorithm; 6.5 Conclusions; References; Chapter 7. …”
Full text (MFA users only)
Electronic eBook