Results 11 to 20 of about 989,620 (282)

Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba   +4 more
doaj   +1 more source

The future of feed formulation for poultry: Toward more sustainable production of meat and eggs

open access: yesAnimal Nutrition, 2023
Current methods for feed formulation are based on minimizing costs, not maximizing profits. Complex models of bird growth and reproduction as functions of genetic, feed and other environmental variables are being developed, but their adaptation has been ...
Gene M. Pesti, Mingan Choct
doaj   +1 more source

A linear programming methodology for approximate dynamic programming

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2020
The linear programming (LP) approach to solve the Bellman equation in dynamic programming is a well-known option for finite state and input spaces to obtain an exact solution.
Díaz Henry   +2 more
doaj   +1 more source

Linear-quadratic programming and its application to data correction of improper linear programming problems

open access: yesOpen Computer Science, 2020
The problem of maximizing a linear function with linear and quadratic constraints is considered. The solution of the problem is obtained in a constructive form using the Lagrange function and the optimality conditions.
Gorelik Victor, Zolotova Tatiana
doaj   +1 more source

Decoding by Linear Programming [PDF]

open access: yes, 2004
This paper considers the classical error correcting problem which is frequently discussed in coding theory. We wish to recover an input vector $f \in \R^n$ from corrupted measurements $y = A f + e$.
Candes, Emmanuel, Tao, Terence
core   +5 more sources

On Linear and Quadratic Two-Stage Transportation Problem

open access: yesКібернетика та комп'ютерні технології, 2020
Introduction. When formulating the classical two-stage transportation problem, it is assumed that the product is transported from suppliers to consumers through intermediate points.
Petro Stetsyuk   +2 more
doaj   +1 more source

LINEAR PROGRAMMING APPLIED TO A CONVEX PROGRAMMING TYPE

open access: yesPesquimat, 2014
In the present’s paper studying a strategy for a typo of convex problem, we treat a linear programming problem whose coefficient of decision variables in the objective function has a nonlinear behavior.
Edinson Raúl Montoro Alegre   +3 more
doaj   +1 more source

Random projections for linear programming [PDF]

open access: yes, 2017
Random projections are random linear maps, sampled from appropriate distributions, that approx- imately preserve certain geometrical invariants so that the approximation improves as the dimension of the space grows.
Liberti, Leo   +2 more
core   +4 more sources

Linear-programming receivers [PDF]

open access: yes2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008
7 pages (double-column), presented at the 46th Annual Allerton Conference on Communication, Control and ...
openaire   +2 more sources

GOAL A D lıNEAR PROGRAMMING

open access: yesForestist, 2005
In this study. linear and goal programming models were to shortly introduced, similarities and differences between structure of the models were to discussed.
Altay Uğur GÜL
doaj   +1 more source

Home - About - Disclaimer - Privacy