Search Results - (( integer application among algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- integer application »
- application among »
- java application »
- among algorithm »
-
1
-
2
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
3
Comparison Of Two Hybrid Algorithms On Incorporated Aircraft Routing And Crew Pairing Problems
Published 2024Get full text
Get full text
journal::journal article -
4
-
5
-
6
-
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…For example, RSA, DES (Data Encryption Standard), Symmetric Key Cryptography. Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
9
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
-
14
Cryptanalysis on prime power RSA modulus of the form N=prq
Published 2016Get full text
Get full text
Article -
15
