Search Results - (((((((ant OR wantis) OR wind) OR channeling) OR cantor) OR anne) OR halten) OR hints) algorithms.

Refine Results
  1. 1

    Ant Colony Optimization and Constraint Programming. by Solnon, Christine

    Published 2013
    Table of Contents: “…Constraint programming; 1.1.2. Ant colony optimization; 1.1.3. Constraint programming with ant colony optimization; Chapter 2. …”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    Theory of randomized search heuristics : foundations and recent developments

    Published 2011
    Table of Contents: “…Runtime Analysis of Evolutionary Algorithms for Discrete Optimization Peter S. Oliveto and Xin Yao; 3. …”
    Full text (MFA users only)
    Electronic eBook
  3. 3

    Algorithmic Puzzles. by Levitin, Anany, Levitin, Maria

    Published 2011
    Table of Contents: “…-- General strategies for algorithm design -- Analysis techniques -- Easier puzzles (#1 to #50) -- Puzzles of medium difficulty (#51 to #110) -- Harder puzzles (#111 to #150) -- Hints -- Solutions -- References -- Design stragety and analysis index.…”
    Full text (MFA users only)
    Electronic eBook
  4. 4

    Algorithmic composition : a guide to composing music with Nyquist by Simoni, Mary Hope

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  5. 5

    Offshore wind energy technology by Anaya-Lara, Olimpo, Tande, John O., 1962-, Uhlen, Kjetil, 1961-, Merz, Karl, 1978-

    Published 2018
    Table of Contents: “…4 Fixed and Floating Offshore Wind Turbine Support Structures4.1 Introduction; 4.2 Bottom-fixed Support Structures; 4.3 Floating Support Structures; 4.4 Design Considerations; 4.5 Conceptual Design; 4.6 Loads in the Marine Environment; 4.7 Global Dynamic Analysis of Offshore Wind Turbines; 4.8 Conclusions; 4.9 References; 5 Offshore Wind Turbine Controls; 5.1 Control Objectives, Sensors and Actuators; 5.2 Control Algorithms; 5.3 A Linear Aeroelastic Loads Model for Closed-loop System Dynamics; 5.4 Basic Rotor Speed Control in Operating Regions I and II; 5.5 Active Damping and Load Reduction.…”
    Full text (MFA users only)
    Electronic eBook
  6. 6

    Nature-inspired optimization algorithms by Yang, Xin-She

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  7. 7

    Permutation Group Algorithms by Seress, kos

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  8. 8

    Algorithms in invariant theory by Sturmfels, Bernd, 1962-

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  9. 9

    Swarm intelligence and bio-inspired computation : theory and applications

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  10. 10

    Ant colony optimization by Dorigo, Marco

    Published 2004
    Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (MFA users only)
    Electronic eBook
  12. 12

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  13. 13

    MMSE-Based Algorithm for Joint Signal Detection, Channel and Noise Variance Estimation for OFDM Systems. by Savaux, Vincent

    Published 2014
    Table of Contents: “…Comparison of SNR estimation with other methods; 2.1.4.5. Channel estimation; 2.2. Algorithm in a practical approach; 2.2.1. …”
    Full text (MFA users only)
    Electronic eBook
  14. 14

    Swarm Intelligence Algorithms : Modifications and Applications. by Slowik, Adam

    Published 2020
    Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Machine Learning Algorithms and Applications. by Srinivas, Mettu

    Published 2021
    Table of Contents: “…2.4 Dataset Generation -- 2.5 Results -- 2.6 Conclusion -- Acknowledgment -- References -- 3 A Wind Speed Prediction System Using Deep Neural Networks -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Results and Discussions -- 3.4 Conclusion -- References -- 4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Preliminaries -- 4.4 Proposed Model -- 4.5 Experiments -- 4.6 Results -- 4.7 Conclusion -- References -- 5 Sakshi Aggarwal, Navjot Singh and K.K. …”
    Full text (MFA users only)
    Electronic eBook
  16. 16

    Security of block ciphers : from algorithm design to hardware implementation by Sakiyama, Kazuo, 1971-

    Published 2015
    Table of Contents: “…Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults.…”
    Full text (MFA users only)
    Electronic eBook
  17. 17

    Pattern Recognition. by Theodoridis, Sergios

    Published 2008
    Table of Contents: “…Chapter 13 Clustering Algorithms II: Hierarchical AlgorithmsChapter 14 Clustering Algorithms III: Schemes Based on Function Optimization; Chapter 15 Clustering Algorithms IV; Chapter 16 Cluster Validity; Appendix A Hints from Probability and Statistics; Appendix B Linear Algebra Basics; Appendix C Cost Function Optimization; Appendix D Basic Definitions from Linear Systems Theory; Index.…”
    Full text (MFA users only)
    Electronic eBook
  18. 18

    Signal processing for 5G : algorithms and implementations

    Published 2016
    Table of Contents: “…Millimeter Waves for 5G: From Theory To Practice / Malik Gul, Eckhard Ohlmer, Ahsan Aziz, Wes McCoy, Yong Rao -- *5G Millimeter-wave Communication Channel and Technology Overview / Li Qian (Clara), Jung Hyejung, Zong Pingping, Wu Geng -- General Principles and Basic Algorithms for Full-duplex Transmission / Thomas Kaiser, Nidal Zarifeh -- Design and Implementation of Full-duplex Transceivers / Katsuyuki Haneda, Mikko Valkama, Taneli Riihonen, Emilio Antonio-Rodriguez, Dani Korpi -- NEW SYSTEM-LEVEL ENABLING TECHNOLOGIES FOR 5G. …”
    Full text (MFA users only)
    Electronic eBook
  19. 19

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Random Iterative Models by Duflo, Marie

    Published 1997
    Full text (MFA users only)
    Electronic eBook