Search Results - (( programming does generation algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- generation algorithm »
- application stemming »
- stemming algorithm »
- programming does »
- java application »
- does generation »
-
1
An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints
Published 2015“…The conventional genetic algorithm procedure for TSP, with an order-based representation might generate invalid candidate solutions when precedence constraints are involved. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…With this system, CoRe department does not need to use a manual approach to analyze the content. …”
Get full text
Get full text
Thesis -
3
Digital diversification to expand the Indonesian radio industry: A Case Study of PRFM, Delta, and Dahlia Stations
Published 2023“…Digitization has made radio stations the business of news portals, global aggregator platforms, programmed journalism or algorithm journalism. How does the radio broadcasting business retain an audience and grow listeners across borders via Facebook, Twitter, Instagram, Youtube, TikTok, WhatsApp and Website? …”
Get full text
Get full text
Get full text
Article -
4
Partial Newton methods for a system of equations
Published 2013“…We also focus on the use of one or two components of the displacement vector to generate a convergent sequence. This approach is inspired by the Simplex Algorithm in Linear Programming. …”
Get full text
Get full text
Get full text
Article -
5
-
6
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
Get full text
Get full text
Final Year Project -
7
-
8
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
Get full text
Conference or Workshop Item -
9
