Search Results - (((((((ant OR wantis) OR wind) OR channeling) OR cantor) OR anne) OR halten) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Wireless communication systems 27
- Artificial intelligence 24
- Mathematics 23
- Mathematical optimization 19
- Mathematical models 17
- Algorithms 15
- Data processing 15
- algorithms 15
- Machine learning 14
- Technological innovations 14
- artificial intelligence 14
- Information technology 11
- Signal processing 11
- Coding theory 10
- Design and construction 10
- Digital techniques 10
- Neural networks (Computer science) 10
- Computer algorithms 9
- Data mining 8
- Mechanical engineering 8
- Artificial Intelligence 7
- Electric power systems 7
- Manufacturing processes 7
- Mechatronics 7
- Mobile communication systems 7
- Computer networks 6
- Management 6
- Neural Networks, Computer 6
- Cognitive radio networks 5
- Cryptography 5
Search alternatives:
- ant »
- wantis »
- cantor »
- wind »
- halten »
-
1
Ant Colony Optimization and Constraint Programming.
Published 2013Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
Full text (MFA users only)
Electronic eBook -
2
Theory of randomized search heuristics : foundations and recent developments
Published 2011Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
Full text (MFA users only)
Electronic eBook -
3
Algorithmic Puzzles.
Published 2011Table of Contents: “…-- General strategies for algorithm design -- Analysis techniques -- Easier puzzles (#1 to #50) -- Puzzles of medium difficulty (#51 to #110) -- Harder puzzles (#111 to #150) -- Hints -- Solutions -- References -- Design stragety and analysis index.…”
Full text (MFA users only)
Electronic eBook -
4
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
5
Offshore wind energy technology
Published 2018Table of Contents: “…4 Fixed and Floating Offshore Wind Turbine Support Structures4.1 Introduction; 4.2 Bottom-fixed Support Structures; 4.3 Floating Support Structures; 4.4 Design Considerations; 4.5 Conceptual Design; 4.6 Loads in the Marine Environment; 4.7 Global Dynamic Analysis of Offshore Wind Turbines; 4.8 Conclusions; 4.9 References; 5 Offshore Wind Turbine Controls; 5.1 Control Objectives, Sensors and Actuators; 5.2 Control Algorithms; 5.3 A Linear Aeroelastic Loads Model for Closed-loop System Dynamics; 5.4 Basic Rotor Speed Control in Operating Regions I and II; 5.5 Active Damping and Load Reduction.…”
Full text (MFA users only)
Electronic eBook -
6
-
7
-
8
-
9
Swarm intelligence and bio-inspired computation : theory and applications
Published 2013Full text (MFA users only)
Electronic eBook -
10
Ant colony optimization
Published 2004Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
Full text (MFA users only)
Electronic eBook -
11
Introduction to cryptography
Published 2018Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
Full text (MFA users only)
Electronic eBook -
12
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
13
MMSE-Based Algorithm for Joint Signal Detection, Channel and Noise Variance Estimation for OFDM Systems.
Published 2014Table of Contents: “…Comparison of SNR estimation with other methods; 2.1.4.5. Channel estimation; 2.2. Algorithm in a practical approach; 2.2.1. …”
Full text (MFA users only)
Electronic eBook -
14
Swarm Intelligence Algorithms : Modifications and Applications.
Published 2020Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
Full text (MFA users only)
Electronic eBook -
15
Machine Learning Algorithms and Applications.
Published 2021Table of Contents: “…2.4 Dataset Generation -- 2.5 Results -- 2.6 Conclusion -- Acknowledgment -- References -- 3 A Wind Speed Prediction System Using Deep Neural Networks -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Results and Discussions -- 3.4 Conclusion -- References -- 4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Preliminaries -- 4.4 Proposed Model -- 4.5 Experiments -- 4.6 Results -- 4.7 Conclusion -- References -- 5 Sakshi Aggarwal, Navjot Singh and K.K. …”
Full text (MFA users only)
Electronic eBook -
16
Security of block ciphers : from algorithm design to hardware implementation
Published 2015Table of Contents: “…Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults.…”
Full text (MFA users only)
Electronic eBook -
17
Pattern Recognition.
Published 2008Table of Contents: “…Chapter 13 Clustering Algorithms II: Hierarchical AlgorithmsChapter 14 Clustering Algorithms III: Schemes Based on Function Optimization; Chapter 15 Clustering Algorithms IV; Chapter 16 Cluster Validity; Appendix A Hints from Probability and Statistics; Appendix B Linear Algebra Basics; Appendix C Cost Function Optimization; Appendix D Basic Definitions from Linear Systems Theory; Index.…”
Full text (MFA users only)
Electronic eBook -
18
Signal processing for 5G : algorithms and implementations
Published 2016Table of Contents: “…Millimeter Waves for 5G: From Theory To Practice / Malik Gul, Eckhard Ohlmer, Ahsan Aziz, Wes McCoy, Yong Rao -- *5G Millimeter-wave Communication Channel and Technology Overview / Li Qian (Clara), Jung Hyejung, Zong Pingping, Wu Geng -- General Principles and Basic Algorithms for Full-duplex Transmission / Thomas Kaiser, Nidal Zarifeh -- Design and Implementation of Full-duplex Transceivers / Katsuyuki Haneda, Mikko Valkama, Taneli Riihonen, Emilio Antonio-Rodriguez, Dani Korpi -- NEW SYSTEM-LEVEL ENABLING TECHNOLOGIES FOR 5G. …”
Full text (MFA users only)
Electronic eBook -
19
-
20