Search Results - (( java implication drops algorithm ) OR ( a constructive exchange algorithm ))
Search alternatives:
- constructive exchange »
- implication drops »
- java implication »
- a constructive »
-
1
Optimization of neural network topology for prediction of outlet temperature of shell and tube heat exchanger: article
Published 2019“…A neural network is constructed to best fit the prediction of outlet temperature of the shell and tube heat exchanger with crossing flow fluids…”
Get full text
Get full text
Article -
2
Optimization of neural network topology for prediction of outlet temperature of shell and tube heat exchanger
Published 2019“…A neural network is constructed to best fit the prediction of outlet temperature of the shell and tube heat exchanger with crossing flow fluids.…”
Get full text
Get full text
Student Project -
3
Hybrid Neural Network and Decision Tree for for Exchange Rates Forecasting
Published 2012“…As the largest financial market in the world, foreign exchange (Forex) is becoming a very profitable market with a daily transaction of more than 3.0 trillion U.S. dollars. …”
Get full text
Get full text
Conference or Workshop Item -
4
Construction and optimization of financial risk management model based on financial data and text data influencing information system
Published 2024“…Qualitative textual informationis used in financial risk assessment to improve risk prediction algorithms. MD&A texts, sentiment analysis, andreadability signal risk. …”
Get full text
Get full text
Get full text
Article -
5
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…Thus, we introduce a new code-based key exchange protocol that is constructed using the Permuted Goppa Syndrome Decoding Problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…Precomputing some of the powers is an option to speed up exponentiation which can save time too. However, we also constructed an algorithm for a parallel version of Vector Addition Chains to enhance the performance. …”
Get full text
Get full text
Research Reports -
7
A new starter sets generation method by fixing any element under exchange restriction
Published 2016“…However all these algorithms have limitations in terms of fixing element to construct the first set (starter set) to begin with.It would be interesting to derive new strategy by fixing an element in any position. …”
Get full text
Get full text
Article -
8
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
Get full text
Get full text
Thesis -
9
A fuzzy-predictive current control with real-time hardware for PEM fuel cell systems
Published 2025“…This research study presents the application of the FC-PCC (Fuzzy Logic Predictive Current Control) algorithm in the context of maximum power point tracking (MPPT) for a proton exchange membrane fuel cell system employing a three-level boost converter (TLBC). …”
Article -
10
Fuzzy Distance Measure Based Affinity Propagation Clustering
Published 2018“…Affinity Propagation (AP) is an effective algorithm that find exemplars repeatedly exchange real valued messages between pairs of data points. …”
Get full text
Get full text
Get full text
Article -
11
Modeling financial environments using geometric fractional Brownian motion model with long memory stochastic volatility
Published 2018“…All parameters involved in the developed model are estimated by using innovation algorithm. A simulation study is then conducted to determine the performance of the new model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021“…The analysis was carried out with a simple algorithm written in R Programming. 45 keywords based on Ibn Khaldun’s thoughts were constructed as the hashtag to retrieve data from Twitter. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
On the mathematical complexity and the time implementation of proposed variants of elliptic curves cryptosystems
Published 2013“…In 2005, Al-Saffar (2005) proposed two new methods for elliptic curve cryptosystems using the keys from the algorithm of Diffie–Hellman Key Exchange. In addition, she introduced a variant of the ElGamal scheme. …”
Get full text
Get full text
Get full text
Article -
15
Reframing Employee Engagement in the Digital Era: A Multilevel Review of Its Impact on Organizational Effectiveness
Published 2025“…This paper reviews and integrates four key theoretical perspectives—Kahn’s Psychological Conditions Theory, Self-Determination Theory, Social Exchange Theory, and Conservation of Resources Theory—to construct a multilevel model of employee engagement. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
New Sequential and Parallel Division Free Methods for Determinant of Matrices
Published 2013“…A determinant plays an important role in many applications of linear algebra. …”
Get full text
Get full text
Get full text
Thesis -
17
New optimization feature for the developed open cnc controller based on ISO 6983 and ISO 14649
Published 2021“…This research aims to minimize tool path airtime during machining of input ISO codes via an ant colony optimization algorithm. A new optimized system was developed based on open architecture control (OAC) technology and interpreted STEP-NC (Standard for the Exchange of Product Model Data) programming approaches. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Process feasibility study of energy integrated distillation columns sequence (EIDCS) for NGL separation process
Published 2025“…The grid diagram of the heat exchanger network for the best sequence is then constructed. …”
Get full text
Get full text
Get full text
Article -
19
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis
