Search Results - (((((((anti OR wint) OR mantis) OR wind) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 121

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  2. 122

    Applied modelling, numerical simulation, computation and optimization. by De Souza Neto, Eduardo

    Published 2017
    Table of Contents: “…Modeling and control of an unbalanced magnetic rotor-bearing system asa bearingless motorNumerical simulation of the influence of particle shape on the mechanical properties of rockfill materials; Heat dissipation analysis of continuously-moving plate undergoing thermal processing using Laplace Adomian decomposition method; A shortcut algorithm for solving long-term conjugate heat transfer problems based on quasi-steady flow; Identification of plastic anisotropy using spherical indentation on different anisotropic yield criterions.…”
    Full text (MFA users only)
    Electronic eBook
  3. 123

    Firewall design and analysis by Liu, Alex X.

    Published 2011
    Table of Contents: “…Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. …”
    Full text (MFA users only)
    Electronic eBook
  4. 124

    Ivor Horton's beginning Visual C++ 2012 by Horton, Ivor

    Published 2012
    Table of Contents: “…Algorithms --…”
    Full text (MFA users only)
    Electronic eBook
  5. 125

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  6. 126

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  7. 127

    Digital holography by Picart, Pascal

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  8. 128

    Uniqueness questions in reconstruction of multidimensional objects from tomography-type projection data by Golubyatnikov, V. P. (Vladimir P.)

    Published 2000
    Table of Contents: “…Stability estimates for recovering the shapes of convex bodies from the shapes of their projections -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  9. 129

    Stochastic Models in Reliability Engineering. by Cui, Lirong

    Published 2020
    Table of Contents: “…5.3 Time-Varying Reliability Evaluation Based on MDD -- 5.3.1 The Construction of System MDD -- 5.3.2 System Reliability Evaluation Based on MDD -- 5.4 Numerical Studies -- 5.4.1 Illustrative Example -- 5.4.2 System MDD for the Illustrative Example -- 5.4.3 System Reliability Assessment for the Illustrative Example -- 5.5 Conclusions -- References -- Chapter 6 An Upside-Down Bathtub-Shaped Failure Rate Model Using a DUS Transformation of Lomax Distribution -- 6.1 Introduction -- 6.2 DUS-Lomax Distribution -- 6.3 Shapes -- 6.3.1 Shape of Probability Density Function…”
    Full text (MFA users only)
    Electronic eBook
  10. 130

    Advances in nonlinear waves and symbolic computation by Yan, Zhenya

    Published 2009
    Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
    Full text (MFA users only)
    Electronic eBook
  11. 131

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  12. 132

    Advanced composites for marine engineering : selected, peer reviewed papers from the 1st International Conference on Advanced Composites for Marine Engineering (ICACME 2013), Septe...

    Published 2015
    Table of Contents: “…Advanced Composites for Marine Engineering; Preface; Table of Contents; Chapter 1: Numerical Methods and Analysis, Optimization, Algorithm and Modelling for Materials and Structures; An Efficient Analytical Failure Analysis Approach for Multilayered Composite Offshore Production Risers; Composite Wind Turbine Blade Aerodynamic and Structural Integrated Design Optimization Based on RBF Meta-Model; Rapid Predicting the Impact Behaviors of Marine Composite Laminates; Study on the Factors of Residual Thermal Stress on Single Lap Joint.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 133

    Advanced Control and Optimization Paradigms for Energy System Operation and Management. by Pal, Kirti

    Published 2023
    Table of Contents: “…3.4: Procedure -- 3.4.1: Solar Photovoltaic System -- 3.4.2: Wind Turbine -- 3.4.3: Battery Energy Storage System -- 3.4.4: Diesel Generator -- 3.5: Modelling of the HRES with Different kinds of Batteries -- 3.6: System Metrics -- 3.6.1: Economic Metrics -- 3.6.2: Technical Performance of the Overall System -- 3.6.3: Contribution of Solar PV -- 3.6.4: Contribution of Wind Turbine and Diesel Generator -- 3.6.5: Technical Specification of Different Batteries Used in HRES -- 3.7: State of Charge of Battery -- 3.8: Emissions through a Different System with Different Batteries -- 3.9: Conclusions…”
    Full text (MFA users only)
    Electronic eBook
  14. 134
  15. 135

    Multi-agent machine learning : a reinforcement approach

    Published 2014
    Table of Contents: “…2.12 Eligibility TracesReferences; Chapter 3: Learning in Two-Player Matrix Games; 3.1 Matrix Games; 3.2 Nash Equilibria in Two-Player Matrix Games; 3.3 Linear Programming in Two-Player Zero-Sum Matrix Games; 3.4 The Learning Algorithms; 3.5 Gradient Ascent Algorithm; 3.6 WoLF-IGA Algorithm; 3.7 Policy Hill Climbing (PHC); 3.8 WoLF-PHC Algorithm; 3.9 Decentralized Learning in Matrix Games; 3.10 Learning Automata; 3.11 Linear Reward-Inaction Algorithm; 3.12 Linear Reward-Penalty Algorithm; 3.13 The Lagging Anchor Algorithm; 3.14 L R-I Lagging Anchor Algorithm; References.…”
    Full text (MFA users only)
    Electronic eBook
  16. 136

    Communication System Security.

    Published 2012
    Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
    Full text (MFA users only)
    Electronic eBook
  17. 137

    Pervasive Computing in Cognitive Communications Applications. by Ghinea, George

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Single-loop sigma delta modulator design and verification for cognitive IoT applications -- Efficient task scheduling on virtual machine in cloud computing environment -- High gain switched beam Yagi-Uda antenna for millimeter wave communications -- PAPR reduction using OQAM for spectrum sensing -- Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm -- Soft computing based audio signal analysis for accident prediction -- Kuznets curve with parabola shaped ultra-wideband antenna with defected ground plane for communications…”
    Full text (MFA users only)
    eBook
  18. 138

    Maritime engineering and technology : proceedings of MARTECH 2011, 1st International Conference on Maritime Technology and Engineering, Lisbon, Portugal, 10-12 May 2011

    Published 2012
    Table of Contents: “…Considering disabled people in sailing yacht designHull shape design of a compressed natural gas ship; Short sea shipping route and stowage plan optimization; Non-linear optimization applied to preliminary ship design; Planning a fleet of containerships for a given set of ports; Design development of an oil and garbage collector and boom layer vessel; Generation of an adaptive triangular mesh from a parametric surface; Ship propulsion & control; Controllable pitch propeller control with neural network algorithm.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  19. 139

    Smart intelligent computing and communication technology

    Published 2021
    Table of Contents: “…Intro -- Title Page -- Preface -- Committees -- Contents -- Evolution of Computing Intelligence -- A Novel Compression Algorithm Based on Bio-Orthogonal Transform and Encoding Methods for Computed Tomography Images -- Performance Analysis of K-Nearest Neighbor Classification Algorithms for Bank Loan Sectors -- An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks -- Identification of Sickle Cells in Erythrocytes Images Using Shape Descriptors -- Impact of Personality Traits on Interpersonal Dependency…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 140