Search Results - (( based operations method algorithm ) OR ( variable operations using algorithm ))
Search alternatives:
- variable operations »
- operations method »
- based operations »
- method algorithm »
- operations using »
- using algorithm »
-
1
-
2
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
3
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
4
Enhanced scalar multiplication algorithm over prime field using elliptic net
Published 2024“…At the field operational level, in comparison to the binary method, the eight-block elliptic net method, and the elliptic net method with ten temporary variables for the 384 bits scenario, the developed scalar multiplication algorithm obtained cost reductions of 57.6%, 31.3%, and 13.2%, respectively. …”
Get full text
Get full text
Get full text
Article -
5
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…The algorithm operates on three simple genetic operators called selection, crossover and mutation. …”
Get full text
Get full text
Get full text
Article -
6
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…This algorithm only applies the optimization scaling factor at the bit node processing of the variable node operation. …”
Get full text
Get full text
Get full text
Thesis -
8
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
9
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Therefore, in this research work, the hill climbing search method has been modified based on fuzzy logic control for improvement of MPPT operation. …”
Get full text
Get full text
Thesis -
14
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis -
15
Temperature control using PID gain scheduling method for glycerin bleaching process: article / Riduan Suluhi
“…Then the controller parameters are determined at a number of operating conditions based on the scheduling variables that have been deformed. …”
Get full text
Get full text
Article -
16
Operational matrix based on Genocchi polynomials for solution of delay differential equations
Published 2017“…We first introduce the properties of Genocchi polynomials and employed them to construct the operational matrices of derivative. Collocation method based on this operational matrix is used. …”
Get full text
Get full text
Get full text
Article -
17
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…Second of all, this study operates within experimental design with Taguchi method to discover the optimal design factors for the two proposed genetic operators. …”
Get full text
Get full text
Thesis -
18
Temperature control using PID gain scheduling method for glycerin bleaching process / Riduan Suluhi
Published 2011“…Then the controller parameters are determined at a number of operating conditions based on the scheduling variables that have been deformed. …”
Get full text
Get full text
Thesis -
19
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…The primary objective of this study is to improve the performance of ECPM algorithm of ECC using the elliptic net (EN) method in affine coordinate over binary and prime fields. …”
Get full text
Get full text
Get full text
Thesis -
20
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…Karnaugh map can provide the simple minimization process for Boolean expression, but it encounters difficulties when the variable is more than four In this research, Genetic Algorithm (GA) technique is used as a tool to search for the optimal solution for the digital circuit structure. …”
Get full text
Get full text
Thesis
