Search Results - "BRUTE!"
-
1
Brute force polarisation of xenon-129
Published 2008“…The utilisation of the brute force technique is hindered by the extraordinarily long relaxation time need for this polarisation to occur. …”
Get full text
-
2
-
3
-
4
A brute-strength approach to improving the quality of seismoelectric data
Published 2012“…In this article, we summarise two experiments we conducted to overcome these SNR limitations using a ‘brute-strength’ approach, i.e., employing a large seismic source, a hydraulic vibrator, and relatively high channel counts.…”
Get full text
-
5
Optimal loading analysis with penalty factors for generators using brute force method
Published 2022“…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
Get full text
Get full text
Get full text
-
6
Automatic question determination level based on OBE using brute force string matching
Published 2013“…The major findings that emerged are as follows: a) the suitable string matching technique to be use is brute force string matching due to the nature to the system and development constraints, b) all the outcomes are categorized into two main domains, including the Cognitive and Psychomotor domains. …”
Get full text
Get full text
-
7
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
-
8
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
-
9
Low-field thermal mixing in [1-13C] pyruvic acid for brute-force hyperpolarization
Published 2016“…This defines conditions for effective mixing, as utilized in ‘brute-force’ hyperpolarization of low-γ nuclei like 13C using Boltzmann polarization from nearby protons. …”
Get full text
-
10
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
Published 2023“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
-
11
Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles
Published 2024“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
-
12
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
Get full text
Get full text
-
13
-
14
The m-delay Autoregressive Model with Application
Published 2020Subjects: Get full text
Get full text
-
15
A novel scheduler for concurrent Tx/Rx wireless mesh networks with weighted links
Published 2012“…We propose an O(|V|2) algorithm, where V is the set of routers, that is orders of magnitude faster than computationally intensive approaches that use the well-known Goemans-Williamson (GWA)'s maximum cut algorithm and also brute-force. Our algorithm generates schedules, on average, with at most 3% and 9% fewer links than the GWA and brute-force approaches respectively.…”
Get full text
-
16
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
Published 2004“…It increases the risk of the password to be captured through password guessing attacks or brute-force attack. So, to reduce the possibility of the attack, we replace the user password with 30 bytes random characters as the passwords. …”
Get full text
-
17
Round length optimisation for P2P network gaming
Published 2007“…In this paper we propose a delay model for RACS, and two centralised algorithms to calculate d for maximum responsiveness - an optimal brute force approach and an efficient voting algorithm. …”
Get full text
-
18
Designing brutal multiplayer video games
Published 2016“…Non-digital forms of play that allow players to direct brute force directly upon each other, such as martial arts, boxing and full contact team sports,are very popular. …”
Get full text
-
19
A survey on the cryptanalysis of the advanced encryption standard
Published 2006“…All of the attacks were launched on reduced-round version and the complexity is compared to that of brute force. Brute force is an attack that tries every possible value of the key of the cipher. …”
Get full text
Get full text
-
20
Cryptanalysis in cryptographic algorithm design
Published 2006“…Short-cut attacks make use of an algorithm’s weaknesses to discover the key faster than brute-force. Brute force is the process of searching for all possible values of the key. …”
Get full text