Search Results - (( java implication based algorithm ) OR ( exchange restriction method algorithm ))
Search alternatives:
- restriction method »
- implication based »
- java implication »
- method algorithm »
-
1
A permutation parallel algorithm under exchange restriction with message passing interface
Published 2014Get full text
Get full text
Conference or Workshop Item -
2
-
3
A new parallel model for starter sets generation via exchanging two elements
Published 2019“…In this study, a technique of parallelization across the method was employed to develop new parallel algorithm for finding all permutations under exchanged restrictions. …”
Get full text
Get full text
Article -
4
-
5
A Telemedicine Tool Framework For Lung Sounds Classification Using Ensemble Classifier Algorithms
Published 2020“…However, this traditional method suffers from restrictions, such as if the doctor isn’t very much practiced, this may lead to an incorrect analysis. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Artificial intelligence techniques applied as estimator in chemical process systems - A literature survey
Published 2015“…However, the various types of AI methods available make it difficult to decide on the most suitable algorithm to be applied for any particular system. …”
Get full text
Get full text
Get full text
Article -
8
Battery management optimization and lifecycle impact analysis for microgrid operation with V2G implementation / Muhammad Sufyan
Published 2019“…The proposed energy management approach is solved using firefly algorithm, artificial bee colony, harmony search algorithm and particle swarm optimization. …”
Get full text
Get full text
Thesis -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
Published 2019“…Aimed at providing such proximity service (ProSe) for mission-critical data exchange in the post-flood environment, the majority of existing solutions rely heavily upon ad-hoc networking approaches, which suffer from restricted communication range and the limited scope of interaction. …”
Get full text
Get full text
Get full text
Article
