Search Results - (( evolution utilization path algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain by Xia, Weifu, Alwie, Aryaty, Taasim, Shairil Izwan, Jin, Wong Tze, Naning, Fatin Hana

    Published 2024
    “…Future research can further explore the long-term evolution path of technological innovation duality and its differences in cross-cultural contexts.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11