Search Results - (((((((kent OR cantini) OR ken) OR arts) OR cantor) OR anne) OR carter) OR cantion) algorithms.

  1. 121

    Polynomial root-finding and polynomiography by Kalantari, Bahman

    Published 2009
    Table of Contents: “…Approximation of square-roots and their visualizations -- The fundamental theorem of algebra and a special case of Taylor's theorem -- Introduction to the basic family and polynomiography -- Equivalent formulations of the basic family -- Basic family as dynamical system -- Fixed points of the basic family -- Algebraic derivation of the basic family and characterizations -- The truncated basic family and the case of Halley family -- Characterizations of solutions of homogeneous linear recurrence relations -- Generalization of Taylor's theorem and Newton's method -- The multipoint basic family and its order of convergence -- A computational study of the multipoint basic family -- A general determinantal lower bound -- Formulas for approximation of pi based on root-finding algorithms -- Bounds on roots of polynomials and analytic functions -- A geometric optimization and its algebraic offsprings -- Polynomiography : algorithms for visualization of polynomial equations -- Visualization of homogeneous linear recurrence relations -- Applications of polynomiography in art, education, science, and mathematics -- Approximation of square-roots revisited -- Further applications and extensions of the basic family and polynomiography.…”
    Full text (MFA users only)
    Electronic eBook
  2. 122

    Advances in Computational Intelligence : Theory & Applications by Wang, Fei-Yue

    Published 2006
    Table of Contents: “…Wang -- 8. Ant colony algorithms: the state-of-the-art / J. Zhang, J. Xu, and S. …”
    Full text (MFA users only)
    Electronic eBook
  3. 123
  4. 124
  5. 125

    Pattern Recognition in Computational Molecular Biology : Techniques and Approaches by Elloumi, Mourad, Iliopoulos, Costas, Wang, Jason T. L., Zomaya, Albert Y.

    Published 2015
    Table of Contents: “…Wiley Series; Title Page; Copyright; Table of Contents; List of Contributors; Preface; Part 1: Pattern Recognition in Sequences; Chapter 1: Combinatorial Haplotyping Problems; 1.1 Introduction; 1.2 Single Individual Haplotyping; 1.3 Population Haplotyping; References; Chapter 2: Algorithmic Perspectives of the String Barcoding Problems; 2.1 Introduction; 2.2 Summary of Algorithmic Complexity Results for Barcoding Problems; 2.3 Entropy-Based Information Content Technique for Designing Approximation Algorithms for String Barcoding Problems.…”
    Full text (MFA users only)
    Electronic eBook
  6. 126

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  7. 127

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Ross -- Virtual reality / Ken Hillis -- Virtuality / Michael Heim -- Walkthrough / Frederik De Grove and Jan Van Looy -- Web comics / Karin Kukkonen -- Wiki writing / Seth Perlow -- Windows / Jay David Bolter -- Word-image / Maria Engberg -- Worlds and maps / Bjarke Liboriussen -- Writing under constraint / Anastasia Salter.…”
    Book
  8. 128

    Key engineering materials

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  9. 129

    Principles of artificial neural networks by Graupe, Daniel

    Published 2013
    Table of Contents: “…Fundamentals of biological neural networks -- ch. 3. Basic principles of ANNs and their early structures. 3.1. Basic principles of ANN design. 3.2. …”
    Full text (MFA users only)
    Electronic eBook
  10. 130

    Comorbidity in migraine

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  11. 131
  12. 132

    Learning OWL class expressions by Lehmann, Jens, 1982-

    Published 2010
    Table of Contents: “…Refinement Operator Based OWL Learning Algorithms; OCEL (OWL Class Expression Learner); Redundancy Elimination; Creating a Full Learning Algorithm; ELTL (EL Tree Learner)…”
    Full text (MFA users only)
    Electronic eBook
  13. 133

    Insect media : an archaeology of animals and technology by Parikka, Jussi, 1976-

    Published 2010
    Table of Contents: “…Introduction: insects in the age of technology -- Nineteenth-century insect technics the uncanny affects of insects -- Genesis of form: insect architecture and swarms -- Technics of nature and temporality: Uexküll's ethology -- Metamorphosis, intensity, and devouring space: elements for an insect game theory -- Intermezzo -- Animal ensembles, robotic affects: bees, milieus, and individuation -- Biomorphs and boids: swarming algorithms -- Sexual selection in the biodigital: teknolust and the weird life of SRAs -- Epilogue insect media as an art of transmutation.…”
    Full text (MFA users only)
    Electronic eBook
  14. 134

    An Eulerian Discontinuous Galerkin Method for the Numerical Simulation of Interfacial Transport. by Kallendorf, Christina

    Published 2017
    Table of Contents: “…List of Figures; Nomenclature; List of Tables; Nomenclature; 1 Introduction; 2 Equations of the Physical Model; 3 State of the Art of Numerical Methods; 4 An Introduction to DG Methods; 5 New Conservation Laws of SurfaceTransport Equations; 6 Exact Solutions to the Interfacial Surfactant Transport Equation; 7 A Narrow Band Method for the Eulerian Approach; 8 The Eulerian DG Algorithm and Numerical Results; 9 Conclusion; A Appendix.…”
    Full text (MFA users only)
    Electronic eBook
  15. 135

    Optimization in polymer processing

    Published 2011
    Table of Contents: “…INTRODUCTION ; 2. STATE-OF-THE-ART ; 3. OPTIMIZATION METHODOLOGY.…”
    Full text (MFA users only)
    Electronic eBook
  16. 136

    Anaphora Resolution. by Mitkov, Ruslan

    Published 2014
    Table of Contents: “…4.1 Early work in anaphora resolution4.2 Student; 4.3 Shrdlu; 4.4 Lunar; 4.5 Hobbs's naïve approach; 4.5.1 The algorithm; 4.5.2 Evaluation of Hobbs' s algorithm; 4.6 The BFP algorithm; 4.7 Carter's shallow processing approach; 4.8 Rich and LuperFoy's distributed architecture; 4.9 Carbonell and Brown's multi-strategy approach; 4.10 Other work; 4.11 Summary; Chapter Five: The present: knowledge-poor and corpus-based approaches in the 1990s and beyond; 5.1 Main trends in recent anaphora resolution research; 5.2 Collocation patterns-based approach; 5.3 Lappin and Leass's algorithm; 5.3.1 Overview.…”
    Full text (MFA users only)
    Electronic eBook
  17. 137

    Shoulder and Elbow Arthroplasty. by Williams, Gerald R.

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  18. 138

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  19. 139
  20. 140

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook