Search Results - (( java application matching algorithm ) OR ( variable operation based algorithm ))
Search alternatives:
- application matching »
- variable operation »
- java application »
- operation based »
-
1
-
2
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…The proposed VGOMS algorithm apply the optimization scaling factor at the bit node processing of the variable node operation which have significantly less complexity as compared with the check node operation or both variable node and check node operation. …”
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel
Published 2019“…The proposed VGOMS algorithm apply the optimization scaling factor at the bit node processing of the variable node operation which have significantly less complexity as compared with the check node operation or both variable node and check node operation. …”
Get full text
Get full text
Get full text
Article -
6
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
7
-
8
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…The common differential equation is transformed into a matrix series product by a different operator matrix. The matrix products are converted to algebraic equations by discrete variables. …”
Get full text
Get full text
Get full text
Article -
11
-
12
TUNING PROCESS OF SINGLE INPUT FUZZY LOGIC CONTROLLER BASED ON LINEAR CONTROL SURFACE APPROXIMATION METHOD FOR DEPTH CONTROL OF UNDERWATER REMOTELY OPERATED VEHICLE
Published 2013“…The optimum parameter will be obtained and approximately no more variable parameter can be tuned because the PSO algorithm will yield optimum parameter. …”
Get full text
Get full text
Article -
13
One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network
Published 2012“…By using 'seen' and 'unseen' of electrical energy demand data were used to test the performance of the proposed algorithm. Based on result obtained, it shows that IWO learning algorithm is capable to produce accurate prediction load demand. …”
Get full text
Get full text
Student Project -
14
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
15
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…Research has shown that stochastic population-based algorithms such as particle swarm optimization (PSO) can be efficient compared to alternatives for VS-CIT problems. …”
Get full text
Get full text
Get full text
Book Chapter -
18
Multi-stage thermal-economical optimization of compact heat exchangers: A new evolutionary-based design approach for real-world problems
Published 2015“…In this paper, a new design strategy is presented where variable operating conditions, which better represent real-world problems, are considered. …”
Get full text
Get full text
Article -
19
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
20
Solving the optimal reactive power dispatch problem based on moth-flame optimizer for power system operation and planning
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item
