Search Results - (((((((kent OR wind) OR alte) OR wind) OR cantor) OR anne) OR shared) OR mantis) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 23
- Data processing 19
- Mathematics 19
- Mathematical models 15
- Machine learning 14
- Technological innovations 13
- Data mining 12
- Management 12
- artificial intelligence 11
- Big data 10
- Information technology 10
- algorithms 10
- Algorithms 9
- Computer algorithms 8
- Computer networks 8
- Electric power systems 8
- Neural networks (Computer science) 8
- Parallel processing (Electronic computers) 8
- Automatic control 7
- Mechatronics 7
- Research 7
- Social aspects 7
- Artificial Intelligence 6
- Bioinformatics 6
- Computer science 6
- Data Mining 6
- Manufacturing processes 6
- Renewable energy sources 6
- Wireless communication systems 6
- methods 6
Search alternatives:
- kent »
-
1
Offshore wind energy technology
Published 2018Table of Contents: “…4 Fixed and Floating Offshore Wind Turbine Support Structures4.1 Introduction; 4.2 Bottom-fixed Support Structures; 4.3 Floating Support Structures; 4.4 Design Considerations; 4.5 Conceptual Design; 4.6 Loads in the Marine Environment; 4.7 Global Dynamic Analysis of Offshore Wind Turbines; 4.8 Conclusions; 4.9 References; 5 Offshore Wind Turbine Controls; 5.1 Control Objectives, Sensors and Actuators; 5.2 Control Algorithms; 5.3 A Linear Aeroelastic Loads Model for Closed-loop System Dynamics; 5.4 Basic Rotor Speed Control in Operating Regions I and II; 5.5 Active Damping and Load Reduction.…”
Full text (MFA users only)
Electronic eBook -
2
Improved Indirect Power Control (IDPC) of Wind Energy Conversion Systems (WECS)
Published 2019Table of Contents: “…Robustness Tests7 for Mode 1, Mode 2 Mode 3 -- A-Mode 1 (Novel IDPC based on T1-FLC, T2-FLC NFC): -- B-Mode 2 (Novel IDPC based on T1-FLC, T2-FLC NFC): -- C-Mode 3 (Novel IDPC based on T1-FLC, T2-FLC NFC): -- 7. WIND-SYSTEM PERFORMANCES RECAPITULATION UNDER SIX (06) PROPOSED IDPC ALGORITHMS -- CONCLUSION -- NOTES -- REFERENCES -- General Conclusion -- 5.1. …”
Full text (MFA users only)
Electronic eBook -
3
Coherent Doppler Wind Lidars in a Turbulent Atmosphere.
Published 2013Full text (MFA users only)
Electronic eBook -
4
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
5
Algorithms for Dummies.
Published 2022Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data…”
Full text (MFA users only)
Electronic eBook -
6
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
7
Introduction to cryptography
Published 2018Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
Full text (MFA users only)
Electronic eBook -
8
The Sharing Economy : Implications for the Future of Hospitality and Tourism.
Published 2017Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
Full text (MFA users only)
Electronic eBook -
9
Parallel Computing Using the Prefix Problem.
Published 1994Table of Contents: “…Preface; Acknowledgments; Part One -- Getting Started; Chapter 1 -- The Prefix Problem And Its Applications; 1.1 The Prefix Problem; 1.2 Why Prefix Problem; 1.3 Exercises; 1.4 Notes and References; Chapter 2 -- Parallel Machines And Models -- An Overview; 2.1 The Need for Parallelism; 2.2 A Classification of Parallel Computers; 2.3 Parallel Models; 2.4 Performance Measures; 2.5 A Parallel Complexity Class; 2.6 Brent's Inequality; 2.7 A Simple Lower Bound; 2.8 Exercises; 2.9 Notes and References; Part Two -- Algorithms For Shared Memory Models.…”
Full text (MFA users only)
Electronic eBook -
10
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
11
Concurrency
Published 2019Table of Contents: “…TECHNICAL PERSPECTIVES ON LAMPORT'SWORK -- 1. Shared Memory and the Bakery Algorithm -- 2. The Notions of Time and Global State in a Distributed System -- 3. …”
Full text (MFA users only)
Electronic eBook -
12
An Introduction to Algorithmic Trading : Basic to Advanced Strategies.
Published 2011Full text (MFA users only)
Electronic eBook -
13
Structural geology algorithms : vectors and tensors
Published 2012Full text (MFA users only)
Electronic eBook -
14
Machine Learning Algorithms and Applications.
Published 2021Table of Contents: “…2.4 Dataset Generation -- 2.5 Results -- 2.6 Conclusion -- Acknowledgment -- References -- 3 A Wind Speed Prediction System Using Deep Neural Networks -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Results and Discussions -- 3.4 Conclusion -- References -- 4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Preliminaries -- 4.4 Proposed Model -- 4.5 Experiments -- 4.6 Results -- 4.7 Conclusion -- References -- 5 Sakshi Aggarwal, Navjot Singh and K.K. …”
Full text (MFA users only)
Electronic eBook -
15
Signal processing for 5G : algorithms and implementations
Published 2016Table of Contents: “…Millimeter Waves for 5G: From Theory To Practice / Malik Gul, Eckhard Ohlmer, Ahsan Aziz, Wes McCoy, Yong Rao -- *5G Millimeter-wave Communication Channel and Technology Overview / Li Qian (Clara), Jung Hyejung, Zong Pingping, Wu Geng -- General Principles and Basic Algorithms for Full-duplex Transmission / Thomas Kaiser, Nidal Zarifeh -- Design and Implementation of Full-duplex Transceivers / Katsuyuki Haneda, Mikko Valkama, Taneli Riihonen, Emilio Antonio-Rodriguez, Dani Korpi -- NEW SYSTEM-LEVEL ENABLING TECHNOLOGIES FOR 5G. …”
Full text (MFA users only)
Electronic eBook -
16
-
17
Introduction to programming : learn to program in Java with data structures, algorithms, and logic
Published 2018Full text (MFA users only)
Electronic eBook -
18
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
19
Sharing economy and big data analytics
Published 2020Table of Contents: “…The Sharing Economy or the Emergence of a New Business Model. …”
Full text (MFA users only)
Electronic eBook -
20
Uberland : how algorithms are rewriting the rules of work
Published 2018Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
Full text (MFA users only)
Electronic eBook