Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Sugi Guritman"'
Publikováno v:
JTAM (Jurnal Teori dan Aplikasi Matematika), Vol 7, Iss 3, Pp 631-642 (2023)
Integral equations are equations in which the unknown function is found to be inside the integral sign. N. H. Abel used the integral equation to analyze the relationship between kinetic energy and potential energy in a falling object, expressed by tw
Externí odkaz:
https://doaj.org/article/7e86626cc9124a5e90a457af5ed39db7
Publikováno v:
Jurnal Matematika UNAND, Vol 12, Iss 1, Pp 65-77 (2023)
In this article, the eigenvalues and inverse of circulant matrices with entries in the first row having the form of a geometric sequence are formulated explicitly in a simple form in one theorem. The method for deriving the formulation of the determi
Externí odkaz:
https://doaj.org/article/e2dc321f62604fd1a3b2fccf82822965
Publikováno v:
JTAM (Jurnal Teori dan Aplikasi Matematika), Vol 6, Iss 3, Pp 711-723 (2022)
Determining eigenvalues, determinants, and inverse for a general matrix is computationally hard work, especially when the size of the matrix is large enough. But, if the matrix has a special type of entry, then there is an opportunity to make it much
Externí odkaz:
https://doaj.org/article/71a7eb3ca9024c45ad92c8afd8d0757c
Publikováno v:
Jurnal Matematika Integratif, Vol 16, Iss 1, Pp 29-40 (2020)
Masalah rute kendaraan dengan kapasitas (capacitated vehicle routing problem) adalah variasi dari masalah rute kendaraan (vehicle routing problem). Pada masalah rute kendaraan dengan kapasitas, kendaraan yang digunakan untuk distribusi produk memilik
Externí odkaz:
https://doaj.org/article/cf35c8aaade945d19ec91f39026dc74c
Publikováno v:
Jambura Journal of Mathematics, Vol 4, Iss 1 (2022)
Information data protection is necessary to ward off and overcome various fraud attacks that may be encountered. A secret sharing scheme that implements cryptographic methods intends to maintain the security of confidential data by a group of trusted
Externí odkaz:
https://doaj.org/article/3a4acb3d40304bba98df4eb398ac83d1
Publikováno v:
Jurnal Sistem Informasi, Vol 9, Iss 2 (2014)
The e-voting system which developed using two central facilities protokol consist of three component that is voting machine as client for interaction with voter, central legitimization agency (CLA) as server voter authentication, and central tabulati
Externí odkaz:
https://doaj.org/article/b77fd844ce624c908efb24ee8ad5d43c
Publikováno v:
Jurnal Matematika Integratif, Vol 16, Iss 1, Pp 29-40 (2020)
Masalah rute kendaraan dengan kapasitas ( capacitated vehicle routing problem ) adalah variasi dari masalah rute kendaraan ( vehicle routing problem ). Pada masalah rute kendaraan dengan kapasitas, kendaraan yang digunakan untuk distribusi produk mem
Publikováno v:
Computer Engineering and Applications Journal, Vol 8, Iss 1 (2019)
Implementation Distance Learning (DL) lecture at High School of Police Science namely Sekolah Tinggi Ilmu Kepolisian (STIK-PTIK) consisted of 32 Polisi Daerah (POLDA) in lecture Distance Learning (DL) throughout Indonesia. System bandwidth management
Publikováno v:
THE THIRD INTERNATIONAL CONFERENCE ON MATHEMATICS: Education, Theory and Application.
Publikováno v:
Journal of Mathematics and Its Applications. 17:47-60
Masalah optimisasi banyak variabel dapat diselesaikan dengan berbagai metode untuk mendapatkan solusi yang optimal. Salah satu metode yang paling sederhana yaitu metode steepest descent. Metode steepest descent menggunakan vektor gradien untuk menent