Search Results - (( code application optimisation algorithm ) OR ( java application search algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- application search »
- code application »
- java application »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
-
3
-
4
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
PID controller design for a twin rotor MIMO system using real coded GA optimisation
Published 2009Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
10
Codebook excited linear predictive coding
Published 2011Get full text
Get full text
Get full text
Book Chapter -
11
Development of CAD/CAM System for Cold Working Closed Die Forging Process
Published 2000“…In the second stage, a finite element analysis and optimisation algorithm was developed to examine the die fatigue life and to optimise the die design. …”
Get full text
Get full text
Thesis -
12
-
13
Artificial immune network model based controller for vibration suppression of flexible structures
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
14
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
15
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Evolutionary Music; Composing Beats and Chords Progression
Published 2020“…Evoluthm utilizes Harmony Search Algorithm and JFUGUE techniques in compliances with artificial intelligence (AI). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis
