Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Due to the intensive development of the global economy, many problems are constantly emerging connected to the safety of ships’ motion in the context of increasing marine traffic. These problems seem to be especially significant for the further development of marine transportation services, with the need to considerably increase their efficiency and reliability. One of the most commonly used approaches to ensuring safety and efficiency is the wide implementation of various automated systems for guidance and control, including such popular systems as marine autopilots, dynamic positioning systems, speed control systems, automatic routing installations, etc. This Special Issue focuses on various problems related to the analysis, design, modelling, and operation of the aforementioned systems. It covers such actual problems as tracking control, path following control, ship weather routing, course keeping control, control of autonomous underwater vehicles, ship collision avoidance. These problems are investigated using methods such as neural networks, sliding mode control, genetic algorithms, L2-gain approach, optimal damping concept, fuzzy logic and others. This Special Issue is intended to present and discuss significant contemporary problems in the areas of automatic control and the routing of marine vessels.
Technology: general issues --- History of engineering & technology --- collision avoidance --- ship domain --- fuzzy inference --- collision risk --- early warning system --- marine vessel --- tracking controller --- stability --- functional --- optimal damping --- fin stabilizer --- ship turning --- heel/roll reduction --- L2-gain --- uncertainty --- non-linearity --- ship motion control --- path-following --- guidance algorithm --- nonlinear feedback --- AIS Data --- trajectory prediction --- waterway transportation --- neural networks --- autonomous navigation --- multi-joint autonomous underwater vehicle (MJ-AUV) --- 3-dimensional modeling --- LQR --- LESO --- multicriteria route planning --- genetic algorithm --- particle swarm optimization --- oceanic meteorological routing --- cooperative game theory --- supply chain management --- supply disruption --- unmanned surface vehicle --- Guidance, Navigation and Control --- course keeping --- adaptive sliding mode --- unmanned surface vehicle (USV) --- system identification --- traditional neural network --- physics-informed neural network --- zigzag test --- n/a
Choose an application
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.
Cryptography --- Ciphers. --- Computer security. --- Mathematics. --- Adaptive chosen-ciphertext attack. --- Advanced Encryption Standard. --- Affine cipher. --- Alice and Bob. --- Autokey cipher. --- Block cipher mode of operation. --- Block cipher. --- Block size (cryptography). --- Brute-force attack. --- Brute-force search. --- Caesar cipher. --- Calculation. --- Chosen-ciphertext attack. --- Chosen-plaintext attack. --- Cipher. --- Ciphertext-only attack. --- Ciphertext. --- Codebook. --- Communication Theory of Secrecy Systems. --- Computational problem. --- Confusion and diffusion. --- Correlation attack. --- Craig Gentry (computer scientist). --- Cryptanalysis. --- Cryptogram. --- Cryptographic engineering. --- Cryptographic hash function. --- Cryptography Research. --- Cryptography. --- Cryptosystem. --- Data Encryption Standard. --- Differential cryptanalysis. --- Diffie–Hellman key exchange. --- Discrete logarithm. --- Disquisitiones Arithmeticae. --- Dual EC DRBG. --- ElGamal encryption. --- Elliptic curve cryptography. --- Encryption. --- Enigma machine. --- Euler's theorem. --- Fast Software Encryption. --- Feistel cipher. --- Fermat's little theorem. --- Forward secrecy. --- Grover's algorithm. --- Hill cipher. --- Homomorphic encryption. --- Hyperelliptic curve cryptography. --- Information theory. --- Initialization vector. --- International Association for Cryptologic Research. --- Kerckhoffs's principle. --- Key (cryptography). --- Key schedule. --- Key size. --- Keystream. --- Known-plaintext attack. --- Lattice problem. --- Linear cryptanalysis. --- Logjam (computer security). --- Mathematical problem. --- Mathematician. --- Mental poker. --- Merkle's Puzzles. --- Monte Carlo algorithm. --- Multiple encryption. --- NSA Suite B Cryptography. --- Nonlinear feedback shift register. --- Number theory. --- Padding (cryptography). --- Permutation box. --- Permutation. --- Plaintext. --- Polyalphabetic cipher. --- Post-quantum cryptography. --- Precomputation. --- Probabilistic encryption. --- Product cipher. --- Public-key cryptography. --- Quantum algorithm. --- Quantum cryptography. --- Quantum key distribution. --- RSA (cryptosystem). --- RSA problem. --- Related-key attack. --- S-box. --- Security level. --- Shor's algorithm. --- Sign (mathematics). --- Spyware. --- Stream cipher. --- Substitution cipher. --- Symmetric-key algorithm. --- Transposition cipher. --- VIC cipher. --- Variable (computer science). --- Vigenère cipher. --- Vulnerability (computing).
Listing 1 - 2 of 2 |
Sort by
|