Search Results - (( integer implementation research algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- implementation research »
- customization algorithm »
- integer implementation »
- research algorithm »
- java application »
-
1
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…CPU implementations are becoming less efficient in handling the computation of crypto algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
ZOT -Mk: A New Algorithm For Big Integer Multiplication
Published 2009“…Since the multiplication on integers is not native to the computer architecture numbering structure of bits and bytes, such algorithms are bound to be a bit slower on the implementation. …”
Get full text
Get full text
Thesis -
3
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
4
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019“…Therefore, this research proposed an implementation of genetic algorithm (GA) with knowledge based operators as an alternative to approximate the solution.…”
Get full text
Get full text
Thesis -
5
Fpga Implementation Of Metaheuristic Optimization Algorithm
Published 2022“…The project begins by researching and identifying metaheuristics which are suitable for FPGA implementation. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011Get full text
Get full text
Research Reports -
7
FPGA implementation of metaheuristic optimization algorithm
Published 2023“…The project begins by researching and identifying metaheuristics which are suitable for FPGA implementation. …”
Get full text
Get full text
Get full text
Article -
8
Hardware architecture of OFCE-HS for hardware implementation
Published 2011“…Attempts to implement OFCE-HS into real-time hardware have been performed by researchers. …”
Get full text
Get full text
Conference or Workshop Item -
9
Case Slicing Technique for Feature Selection
Published 2004“…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
Get full text
Get full text
Thesis -
10
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
11
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
12
FPGA implementation of variable precision Euclid’s GCD algorithm
Published 2017“…Introduction: Euclid's algorithm is well-known for its efficiency and simple iterative to compute the greatest common divisor (GCD) of two non-negative integers. …”
Get full text
Get full text
Get full text
Article -
13
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Nondominated solutions are produced for every dataset to mark the tradeoff between the conflicting objectives studied in this research. Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis -
15
-
16
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
Get full text
Get full text
Get full text
Article -
17
Extending Pollard class of factorable RSA modulus
Published 2018Get full text
Get full text
Conference or Workshop Item -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
19
-
20
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…This research methodology consists of four fundamental steps: literature review, data collection, experiment implementation, and report writing. …”
Get full text
Get full text
Thesis
