Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Subiono"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 3, Pp 627-635 (2022)
Cryptography has a role to secure an important information. Until now, many varieties of cryptographic algorithms are available in the literature. In this paper, we propose a cryptographic algorithm based on Type IVa max-plus wavelet transforms (MP-W
Externí odkaz:
https://doaj.org/article/0452e0ec57f141518a82ca805344f601
Publikováno v:
Foundations of Computing and Decision Sciences, Vol 46, Iss 4, Pp 319-337 (2021)
Rough set theory is a mathematical approach to imperfect knowledge. The near set approach leads to partitions of ensembles of sample objects with measurable information content and an approach to feature selection. In this paper, we apply the previou
Externí odkaz:
https://doaj.org/article/3f60322c9fa444c1ac11299a7a5eb55f
Autor:
Khabib Musthofa, Subiono
Publikováno v:
Legitima: Jurnal Hukum Keluarga Islam, Vol 2, Iss 2, Pp 153-170 (2020)
Artikel ini mencoba menggambarkan fakta buram perceraian di Kalimantan Tengah. Karena Perceraian merupakan malapetaka hidup, karena dampaknya akan banyak mulai dari anak yang menjadi korban, berantakannya keluarga, hingga ke ekonomi. Jenis artikel in
Externí odkaz:
https://doaj.org/article/a0fea36a2bb54f298fe08aa782867798
Autor:
Subiono Subiono, Soleha Soleha
Publikováno v:
Pattimura Proceeding: Conference of Science and Technology. 4:29-34
Hipergrup adalah salah satu topik menarik yang banyak perekmbangannya saat ini. Selain mempelajari subhipergrup, terdapat matematikawan yang mengkomputasi hipergrup berhingga. Misalkan adalah hipergrup dan adalah relasi fundamental pada , yaitu, rela
Publikováno v:
Discrete Mathematics, Algorithms & Applications; Nov2023, Vol. 15 Issue 8, p1-31, 31p
Publikováno v:
Discrete Mathematics, Algorithms and Applications.
In this paper, we study near approximations in Cayley graphs, which are an extended study of rough approximations in Cayley graphs by using more than one equivalence relations. Furthermore, we introduce the notion of a near edge Cayley graphs, expand
Publikováno v:
Proceedings of the 6th International Conference on Combinatorics, Graph Theory, and Network Topology (ICCGANT 2022) ISBN: 9789464631371
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::48b15f530d5be30618e3a2189d700246
https://doi.org/10.2991/978-94-6463-138-8_6
https://doi.org/10.2991/978-94-6463-138-8_6
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:627-635
Cryptography has a role to secure an important information. Until now, many varieties of cryptographic algorithms are available in the literature. In this paper, we propose a cryptographic algorithm based on Type IVa max-plus wavelet transforms (MP-W
Autor:
Khabib Musthofa, Subiono Subiono
Publikováno v:
TRANSFORMATIF. 4:143-158
Hate speech is a lively reprehensible phenomenon on Indonesian social media, the impact of danger if it is not addressed wisely, through its circular related hate speech has been affirmed if hate speech is not handled properly and immediately, it can