Search Results - (( developing string _ algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- applications using »
- developing string »
- java applications »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
4
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
5
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…Quasigroup String transformation is one of those primitives that have many applications in cryptographic algorithms, Hash functions, and Pseudo-Random Number Generators. …”
Get full text
Get full text
Article -
6
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
A new text-based w-distance metric to find the perfect match between words
Published 2020“…To improve the perfect-match calculation functionality in the traditional k-NN algorithm, a new similarity distance metric is developed and named as word-distance (w-distance). …”
Get full text
Get full text
Article -
9
Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system: article / Wan Nur Liyana Wan Abd Rahman
Published 2013“…Cuckoo Search algorithm is a new metaheuristic optimization algorithm that was recently developed by Yang and Deb in year 2009. …”
Get full text
Get full text
Article -
10
Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system / Wan Nur Liyana Wan Abd Rahman
Published 2013“…Cuckoo Search algorithm is a new metaheuristic optimization algorithm that was recently developed by Yang and Deb in year 2009. …”
Get full text
Get full text
Thesis -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
-
14
Simulation of vibrating string
Published 2001“…This project illustrates the steps involved in the computer simulation of a physical phenomenon by considering the problem of wave propagation in a thin elastic string. A computer program is developed to compute the shape of the string at any time, given any initial shape. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
15
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…For this purpose, string similarity measures are widely utilized for comparing record-pairs in different studies. …”
Get full text
Thesis -
16
Single-phase single stage string inverter for grid connected photovoltaic system
Published 2015“…This paper presents the development of single-phase single stage string inverters for grid connected photovoltaic system. …”
Get full text
Get full text
Get full text
Article -
17
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment
Published 2023“…Genetic Algorithm (GA) belongs to elementary stochastic optimization algorithms inspired by evolution.It points out the ability of simple representations using bit strings to encode complicated structures and the power of simple transformations to reach the desired solution. …”
Conference Paper
