Search Results - (( developing string _ algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    A hybrid database encryption algorithm based on reverse string and dynamic key by Abduljabbar, Waleed Khalid, Mohd Jamil, Jastini, Mohd Shaharanee, Izwan Nizal, Ahmed, Waleed K., Ali, Azhar Tareq

    Published 2016
    “…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation by Hassan Disina, Abdulkadir, Jamel, Sapiee, Abubakar Pindar, Zahraddeen, Mat Deris, Mustafa

    Published 2018
    “…Quasigroup String transformation is one of those primitives that have many applications in cryptographic algorithms, Hash functions, and Pseudo-Random Number Generators. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…To improve the perfect-match calculation functionality in the traditional k-NN algorithm, a new similarity distance metric is developed and named as word-distance (w-distance). …”
    Get full text
    Get full text
    Article
  6. 6

    Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system: article / Wan Nur Liyana Wan Abd Rahman by Wan Abd Rahman, Wan Nur Liyana

    Published 2013
    “…Cuckoo Search algorithm is a new metaheuristic optimization algorithm that was recently developed by Yang and Deb in year 2009. …”
    Get full text
    Get full text
    Article
  7. 7

    Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system / Wan Nur Liyana Wan Abd Rahman by Wan Abd Rahman, Wan Nur Liyana

    Published 2013
    “…Cuckoo Search algorithm is a new metaheuristic optimization algorithm that was recently developed by Yang and Deb in year 2009. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Simulation of vibrating string by Loo, Twan Guan, Choy, Kam Heng

    Published 2001
    “…This project illustrates the steps involved in the computer simulation of a physical phenomenon by considering the problem of wave propagation in a thin elastic string. A computer program is developed to compute the shape of the string at any time, given any initial shape. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…For this purpose, string similarity measures are widely utilized for comparing record-pairs in different studies. …”
    Get full text
    Thesis
  13. 13

    Single-phase single stage string inverter for grid connected photovoltaic system by Mohammad Noor, Siti Zaliha, Omar, Ahmad Maliki, Mohd Radzi, Mohd Amran

    Published 2015
    “…This paper presents the development of single-phase single stage string inverters for grid connected photovoltaic system. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Genetic Algorithm (GA) belongs to elementary stochastic optimization algorithms inspired by evolution.It points out the ability of simple representations using bit strings to encode complicated structures and the power of simple transformations to reach the desired solution. …”
    Conference Paper
  16. 16

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…They are Cross Entropy and also Genetic Algorithm. CE is a new algorithm that was recently developed using probability. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Prevention of Textual Plagiarism Application by Mohd Nor, Nor Atikah

    Published 2011
    “…This form of plagiarism can be categorized as a form of direct stealing without proper acknowledgment and consent of another's work. Rabin - Karp Algorithm which is a string searching algorithm that uses hashing to compare the strings will be integrated in this project as well. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin by Shamsudin, Muhamad

    Published 2001
    “…Dynamic programming is introduced to serve as underlying principle for solving problems in different areas such as operations research, computer science, speech processing and string processing. Longest Common Subsequence algorithm (LCS) has been developed to solve string matching problems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network by Francis, Adam

    Published 2005
    “…The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. And lastly, to develop an Artificial Neural Network for digit recognition. …”
    Get full text
    Student Project