Results 11 to 20 of about 124,509 (238)

Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba   +4 more
doaj   +1 more source

The future of feed formulation for poultry: Toward more sustainable production of meat and eggs

open access: yesAnimal Nutrition, 2023
Current methods for feed formulation are based on minimizing costs, not maximizing profits. Complex models of bird growth and reproduction as functions of genetic, feed and other environmental variables are being developed, but their adaptation has been ...
Gene M. Pesti, Mingan Choct
doaj   +1 more source

A linear programming methodology for approximate dynamic programming

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2020
The linear programming (LP) approach to solve the Bellman equation in dynamic programming is a well-known option for finite state and input spaces to obtain an exact solution.
Díaz Henry   +2 more
doaj   +1 more source

Linear-quadratic programming and its application to data correction of improper linear programming problems

open access: yesOpen Computer Science, 2020
The problem of maximizing a linear function with linear and quadratic constraints is considered. The solution of the problem is obtained in a constructive form using the Lagrange function and the optimality conditions.
Gorelik Victor, Zolotova Tatiana
doaj   +1 more source

On Linear and Quadratic Two-Stage Transportation Problem

open access: yesКібернетика та комп'ютерні технології, 2020
Introduction. When formulating the classical two-stage transportation problem, it is assumed that the product is transported from suppliers to consumers through intermediate points.
Petro Stetsyuk   +2 more
doaj   +1 more source

LINEAR PROGRAMMING APPLIED TO A CONVEX PROGRAMMING TYPE

open access: yesPesquimat, 2014
In the present’s paper studying a strategy for a typo of convex problem, we treat a linear programming problem whose coefficient of decision variables in the objective function has a nonlinear behavior.
Edinson Raúl Montoro Alegre   +3 more
doaj   +1 more source

Linear-programming receivers [PDF]

open access: yes2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008
7 pages (double-column), presented at the 46th Annual Allerton Conference on Communication, Control and ...
openaire   +2 more sources

The Bayes Linear Programming Language [B/D]

open access: yesJournal of Statistical Software, 2000
Bayes linear methodology provides a quantitative structure for expressing our beliefs and systematic methods for revising these beliefs given observational data.
David Wooff, Michael Goldstein
doaj   +3 more sources

Team Teaching Load using Linear Programming

open access: yesJournal of Computing Research and Innovation, 2019
Assignment of teaching loads refers to the allocation of teaching hours among academic staff. It will be the ideal way to assign the right courses to the right staff based on their expertise, preference and experience.
Syadatul Syaeda binti Mat Saleh   +2 more
doaj   +5 more sources

Mixed logical-linear programming

open access: yesDiscrete Applied Mathematics, 1999
Mixed logical/linear programming (MLLP) is an extension of mixed integer/linear programming (MILP). It can represent the discrete elements of a problem with logical propositions and provides a more natural modeling framework than MILP. It can also have computational advantages, partly because it eliminates integer variables when they serve no purpose ...
Hooker, J.N., Osorio, M.A.
openaire   +2 more sources

Home - About - Disclaimer - Privacy