Search alternatives:
algorithm information » algorithms information (Expand search), algorithmic information (Expand search), algorithms informatics (Expand search)
solution algorithm » resolution algorithm (Expand search), evolution algorithm (Expand search), selection algorithm (Expand search)
coder solution » code solution (Expand search), copper solution (Expand search), powder solution (Expand search)
costing method » costing methods (Expand search), cost method (Expand search)
using costing » using coating (Expand search), using boosting (Expand search), using coatings (Expand search)
method python » method method (Expand search), python python (Expand search)
algorithm information » algorithms information (Expand search), algorithmic information (Expand search), algorithms informatics (Expand search)
solution algorithm » resolution algorithm (Expand search), evolution algorithm (Expand search), selection algorithm (Expand search)
coder solution » code solution (Expand search), copper solution (Expand search), powder solution (Expand search)
costing method » costing methods (Expand search), cost method (Expand search)
using costing » using coating (Expand search), using boosting (Expand search), using coatings (Expand search)
method python » method method (Expand search), python python (Expand search)
1
“... is accomplished by using a MAP-based MD-decoding algorithm available in literature, while the robust transmission...”
Access document
Access document
Master thesis
2
“... complex solutions based on solutions to simpler problems. Using this idea, we propose a method to promote...”
Access document
Access document
Master thesis
3
4
“... their operation without sharing raw information. The algorithm is tested on a modified IEEE 24-bus test...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
5
“... antennas and multiple receiving antennas, using error correction codes. Through the union of these two...”
Access document
Access document
Article
6
7
8
9
10
11
12
Subjects:
“...[en] INFORMATION SECURITY...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
13
14
15
16
“... of the algorithm. The restoration method was then proposed to move the particles towards higher regions...”
Access document
Access document
Doctoral thesis
17
“... monitoring, the creation of communication profiles for each user/machine, an analysis algorithm using machine...”
Access document
Access document
Master thesis
18
“... is designed to temporarily meet the grid code, postponing unplanned investments while a definitive solution...”
Access document
Access document
Article
19
20