Search Results - (((((((kent OR wind) OR alte) OR wind) OR cantor) OR anne) OR shared) OR mantis) algorithms.

Search alternatives:

Refine Results
  1. 1

    Offshore wind energy technology by Anaya-Lara, Olimpo, Tande, John O., 1962-, Uhlen, Kjetil, 1961-, Merz, Karl, 1978-

    Published 2018
    Table of Contents: “…4 Fixed and Floating Offshore Wind Turbine Support Structures4.1 Introduction; 4.2 Bottom-fixed Support Structures; 4.3 Floating Support Structures; 4.4 Design Considerations; 4.5 Conceptual Design; 4.6 Loads in the Marine Environment; 4.7 Global Dynamic Analysis of Offshore Wind Turbines; 4.8 Conclusions; 4.9 References; 5 Offshore Wind Turbine Controls; 5.1 Control Objectives, Sensors and Actuators; 5.2 Control Algorithms; 5.3 A Linear Aeroelastic Loads Model for Closed-loop System Dynamics; 5.4 Basic Rotor Speed Control in Operating Regions I and II; 5.5 Active Damping and Load Reduction.…”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    Improved Indirect Power Control (IDPC) of Wind Energy Conversion Systems (WECS) by Amrane, Fayssal, Chaiba, Azeddine

    Published 2019
    Table of Contents: “…Robustness Tests7 for Mode 1, Mode 2 Mode 3 -- A-Mode 1 (Novel IDPC based on T1-FLC, T2-FLC NFC): -- B-Mode 2 (Novel IDPC based on T1-FLC, T2-FLC NFC): -- C-Mode 3 (Novel IDPC based on T1-FLC, T2-FLC NFC): -- 7. WIND-SYSTEM PERFORMANCES RECAPITULATION UNDER SIX (06) PROPOSED IDPC ALGORITHMS -- CONCLUSION -- NOTES -- REFERENCES -- General Conclusion -- 5.1. …”
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4
  5. 5

    Algorithms for Dummies. by Mueller, John Paul

    Published 2022
    Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data…”
    Full text (MFA users only)
    Electronic eBook
  6. 6
  7. 7

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (MFA users only)
    Electronic eBook
  8. 8

    The Sharing Economy : Implications for the Future of Hospitality and Tourism. by Okumus, Fevzi

    Published 2017
    Table of Contents: “…Chaos and complexity in tourismStudy tenets -- The sharing economy and tourism -- Peer-to-peer accommodation in Greece -- Methods -- Participants -- Sample determination and collection -- Measures -- Implementation of fuzzy-set qualitative comparative analysis algorithms -- Results -- Sufficient complex statements -- Discussion -- Confirmation of tenets -- Fuzzy-set qualitative comparative analysis versus regression and Cramerâ#x80;#x99;s V -- Fit and predictive validity -- Managerial implications -- Limitations and future research -- References…”
    Full text (MFA users only)
    Electronic eBook
  9. 9

    Parallel Computing Using the Prefix Problem. by Lakshmivarahan, S.

    Published 1994
    Table of Contents: “…Preface; Acknowledgments; Part One -- Getting Started; Chapter 1 -- The Prefix Problem And Its Applications; 1.1 The Prefix Problem; 1.2 Why Prefix Problem; 1.3 Exercises; 1.4 Notes and References; Chapter 2 -- Parallel Machines And Models -- An Overview; 2.1 The Need for Parallelism; 2.2 A Classification of Parallel Computers; 2.3 Parallel Models; 2.4 Performance Measures; 2.5 A Parallel Complexity Class; 2.6 Brent's Inequality; 2.7 A Simple Lower Bound; 2.8 Exercises; 2.9 Notes and References; Part Two -- Algorithms For Shared Memory Models.…”
    Full text (MFA users only)
    Electronic eBook
  10. 10

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Concurrency by Malkhi, Dahlia

    Published 2019
    Table of Contents: “…TECHNICAL PERSPECTIVES ON LAMPORT'SWORK -- 1. Shared Memory and the Bakery Algorithm -- 2. The Notions of Time and Global State in a Distributed System -- 3. …”
    Full text (MFA users only)
    Electronic eBook
  12. 12
  13. 13
  14. 14

    Machine Learning Algorithms and Applications. by Srinivas, Mettu

    Published 2021
    Table of Contents: “…2.4 Dataset Generation -- 2.5 Results -- 2.6 Conclusion -- Acknowledgment -- References -- 3 A Wind Speed Prediction System Using Deep Neural Networks -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Results and Discussions -- 3.4 Conclusion -- References -- 4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Preliminaries -- 4.4 Proposed Model -- 4.5 Experiments -- 4.6 Results -- 4.7 Conclusion -- References -- 5 Sakshi Aggarwal, Navjot Singh and K.K. …”
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Signal processing for 5G : algorithms and implementations

    Published 2016
    Table of Contents: “…Millimeter Waves for 5G: From Theory To Practice / Malik Gul, Eckhard Ohlmer, Ahsan Aziz, Wes McCoy, Yong Rao -- *5G Millimeter-wave Communication Channel and Technology Overview / Li Qian (Clara), Jung Hyejung, Zong Pingping, Wu Geng -- General Principles and Basic Algorithms for Full-duplex Transmission / Thomas Kaiser, Nidal Zarifeh -- Design and Implementation of Full-duplex Transceivers / Katsuyuki Haneda, Mikko Valkama, Taneli Riihonen, Emilio Antonio-Rodriguez, Dani Korpi -- NEW SYSTEM-LEVEL ENABLING TECHNOLOGIES FOR 5G. …”
    Full text (MFA users only)
    Electronic eBook
  16. 16

    Graph algorithms and applications 3

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  17. 17
  18. 18
  19. 19

    Sharing economy and big data analytics by Sedkaoui, Soraya, Khelfaoui, Mounia

    Published 2020
    Table of Contents: “…The Sharing Economy or the Emergence of a New Business Model. …”
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Uberland : how algorithms are rewriting the rules of work by Rosenblat, Alex, 1987-

    Published 2018
    Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
    Full text (MFA users only)
    Electronic eBook