Search Results - "BRUTE!"

Refine Results
  1. 1

    Brute force polarisation of xenon-129 by O'Neill, Jason Darren

    Published 2008
    “…The utilisation of the brute force technique is hindered by the extraordinarily long relaxation time need for this polarisation to occur. …”
    Get full text
  2. 2
  3. 3
  4. 4

    A brute-strength approach to improving the quality of seismoelectric data by Dean, T, Dupuis, Christian, Valuri, Jason, Herrman, Rolph

    Published 2012
    “…In this article, we summarise two experiments we conducted to overcome these SNR limitations using a ‘brute-strength’ approach, i.e., employing a large seismic source, a hydraulic vibrator, and relatively high channel counts.…”
    Get full text
  5. 5

    Optimal loading analysis with penalty factors for generators using brute force method by Alam, Mohammad Khurshed, Sulaiman, Mohd Herwan

    Published 2022
    “…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
    Get full text
    Get full text
    Get full text
  6. 6

    Automatic question determination level based on OBE using brute force string matching by Loo Zhang, Bin

    Published 2013
    “…The major findings that emerged are as follows: a) the suitable string matching technique to be use is brute force string matching due to the nature to the system and development constraints, b) all the outcomes are categorized into two main domains, including the Cognitive and Psychomotor domains. …”
    Get full text
    Get full text
  7. 7

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
    Get full text
    Get full text
  8. 8

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
    Get full text
    Get full text
  9. 9

    Low-field thermal mixing in [1-13C] pyruvic acid for brute-force hyperpolarization by Peat, David T., Hirsch, Matthew L., Gadian, David G., Horsewill, Anthony J., Owers-Bradley, John R., Kempf, James G.

    Published 2016
    “…This defines conditions for effective mixing, as utilized in ‘brute-force’ hyperpolarization of low-γ nuclei like 13C using Boltzmann polarization from nearby protons. …”
    Get full text
  10. 10

    Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles by Abulifa, Abdulhadi Abdulsalam, Che Soh, Azura, Hassan, Mohd Khair, Raja Kamil, Mohd Radzi, Mohd Amran

    Published 2023
    “…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
    Get full text
    Get full text
  11. 11

    Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles by Abdulsalam Abulifa, Abdulhadi, Che Soh, Azura, Hassan, Mohd Khair, Kamil, Raja, Mohd Radzi, Mohd Amran

    Published 2024
    “…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
    Get full text
    Get full text
  12. 12

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
    Get full text
    Get full text
  13. 13
  14. 14
  15. 15

    A novel scheduler for concurrent Tx/Rx wireless mesh networks with weighted links by Chin, Kuek, Soh, Sieteng, Meng, C.

    Published 2012
    “…We propose an O(|V|2) algorithm, where V is the set of routers, that is orders of magnitude faster than computationally intensive approaches that use the well-known Goemans-Williamson (GWA)'s maximum cut algorithm and also brute-force. Our algorithm generates schedules, on average, with at most 3% and 9% fewer links than the GWA and brute-force approaches respectively.…”
    Get full text
  16. 16

    Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin by Baharuddin, Muhamad Syuhaimi

    Published 2004
    “…It increases the risk of the password to be captured through password guessing attacks or brute-force attack. So, to reduce the possibility of the attack, we replace the user password with 30 bytes random characters as the passwords. …”
    Get full text
  17. 17

    Round length optimisation for P2P network gaming by Webb, Steven, Soh, Sieteng

    Published 2007
    “…In this paper we propose a delay model for RACS, and two centralised algorithms to calculate d for maximum responsiveness - an optimal brute force approach and an efficient voting algorithm. …”
    Get full text
  18. 18

    Designing brutal multiplayer video games by Marshall, Joe, Linehan, Conor, Hazzard, Adrian

    Published 2016
    “…Non-digital forms of play that allow players to direct brute force directly upon each other, such as martial arts, boxing and full contact team sports,are very popular. …”
    Get full text
  19. 19

    A survey on the cryptanalysis of the advanced encryption standard by Z’aba, Muhammad Reza, Maarof, Mohd. Aizaini

    Published 2006
    “…All of the attacks were launched on reduced-round version and the complexity is compared to that of brute force. Brute force is an attack that tries every possible value of the key of the cipher. …”
    Get full text
    Get full text
  20. 20

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Short-cut attacks make use of an algorithm’s weaknesses to discover the key faster than brute-force. Brute force is the process of searching for all possible values of the key. …”
    Get full text