Search Results - (((((((want OR canton) OR span) OR wants) OR cantor) OR anne) OR carter) OR anting) algorithms.

  1. 161
  2. 162

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    There's Something about Gödel : The Complete Guide to the Incompleteness Theorem. by Berto, Francesco

    Published 2009
    Table of Contents: “…. -- 6 ... and the unsatisfied logicists, Frege and Russell -- 7 Bits of set theory -- 8 The Abstraction Principle -- 9 Bytes of set theory -- 10 Properties, relations, functions, that is, sets again -- 11 Calculating, computing, enumerating, that is, the notion of algorithm…”
    Full text (MFA users only)
    eBook
  4. 164

    Clinical simulation : operations, engineering and management

    Published 2008
    Table of Contents: “…; 3.5 The Systems Approach to Training; 3.6 Defining the Performance Requirement; 3.7 Cost Versus Value Added; 3.8 Operations Cost; 3.9 Standardization: What is it, and who Wants it?; 3.10 Patients as Training Conditions; 3.11 Equipment as Training Conditions; 3.12 Increase in Training System Cost; 3.13 You as the Leader-Manager; 3.14 Conclusion; Endnotes; Topic II What's In It For Me.…”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Cognitive Electronic Warfare : An Artificial Intelligence Approach. by Haigh, Karen

    Published 2021
    Table of Contents: “…-- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.…”
    Full text (MFA users only)
    Electronic eBook
  6. 166

    OpenCV Android Programming By Example. by Muhammad, Amgad

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Apache Spark for Data Science Cookbook. by Chitturi, Padma Priya

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow. by Ravichandiran, Sudharsan

    Published 2018
    Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015

    Published 2015
    Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  10. 170
  11. 171

    MATLAB for Machine Learning. by Ciaburro, Giuseppe

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Database technology for life sciences and medicine

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  13. 173
  14. 174

    Smart buildings, smart communities and demand response

    Published 2021
    Table of Contents: “…Demand Response in Smart Zero Energy Buildings and Grids / Nikos Kampelis -- DR in Smart and Near-zero Energy Buildings: The Leaf Community / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- Performance of Industrial and Residential Near-zero Energy Buildings / Nikos Kampelis, Konstantinos Gobakis, Vagias Vagias, Denia Kolokotsa, Laura Standardi, Daniela Isidori, Cristina Cristalli, Fabio Maria Montagnino, Filippo Paredes, Pietro Muratore, Luca Venezia, Marina Kyprianou Dracou, Alaric Montenon, Andri Pyrgou, Theoni Karlessi, Mattheos Santamouris -- HVAC Optimization Genetic Algorithm for Industrial Near-Zero Energy Building Demand Response / Nikos Kampelis, Nikolaos Sifakis, Denia Kolokotsa, Konstantinos Gobakis, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions / Nikos Kampelis, Elisavet Tsekeri, Denia Kolokotsa, Konstantinos Kalaitzakis, Daniela Isidori, Cristina Cristalli -- Conclusions and Recommendations.…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    The bitcoin big bang : how alternative currencies are about to change the world by Kelly, Brian, 1971-

    Published 2014
    Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Handbook of Mixture Analysis

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Optimization advances in electric power systems

    Published 2008
    Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Oracle SOA Suite 11g Performance Cookbook. by Brasier, Matthew

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  19. 179
  20. 180

    Artificial intelligent techniques for electric and hybrid electric vehicles

    Published 2020
    Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
    Full text (MFA users only)
    Electronic eBook