Search Results - (( java application stemming algorithm ) OR ( integer implementation new algorithm ))
Search alternatives:
- integer implementation »
- application stemming »
- stemming algorithm »
- implementation new »
- java application »
- new algorithm »
-
1
ZOT -Mk: A New Algorithm For Big Integer Multiplication
Published 2009“…We named the new numbering structure as "ZOT". The new algorithm for big numbers mUltiplication, ZOT-MK, is constructed from the combination of Karatsuba algorithm and the ZOT structure.…”
Get full text
Get full text
Thesis -
2
Hardware architecture of OFCE-HS for hardware implementation
Published 2011“…Attempts to implement OFCE-HS into real-time hardware have been performed by researchers. …”
Get full text
Get full text
Conference or Workshop Item -
3
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…Stochastic optimization algorithms are a new breed of optimizers that have recently been developed. …”
Get full text
Get full text
Research Reports -
4
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
6
Case Slicing Technique for Feature Selection
Published 2004“…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
Get full text
Get full text
Thesis -
7
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…This study describes three algorithms for efficient implementations in Elliptic Curve Cryptography (ECC). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
9
Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior
Published 2023“…A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
Article -
10
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…We proposed a new key generation technique based on TCE for the security of data. …”
Get full text
Get full text
Article -
11
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…Two models, Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) to represent the minimal reduct computation problem were proposed. …”
Get full text
Get full text
Thesis -
12
Wild goats optimization approach for capacitor placement problem
Published 2019“…To cope with this problem, a new approach entitled Wild Goats Algorithm (WGA) is used. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis
