Search Results - (( developing string based algorithm ) OR ( based applications using algorithm ))
Search alternatives:
- based applications »
- applications using »
- developing string »
- using algorithm »
- string based »
-
1
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
4
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…They are Cross Entropy and also Genetic Algorithm. CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
5
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
6
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
7
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
10
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…Further more, a prototype hardware has been designed and constructed to test the success chromosome string, which called as GA based Logic Implementer (GALI). …”
Get full text
Get full text
Thesis -
11
Web application vulnerabilities detection model
Published 2016“…In addition, the proposed detection model will be able to generate the report regarding the level of vulnerability of the web application. The research will be carried out by using design string matching algorithm. …”
Get full text
Get full text
Research Reports -
12
Heartbeat disease diagnosis using text-based approaches
Published 2011“…The MIDI files are then encoded to text strings using the pitch and duration information based on n-gram, these text strings then form musical words. …”
Get full text
Get full text
Thesis -
13
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…Two control schemes; logic control and current closed-loop control are developed for retaining the required DC output voltage. …”
Get full text
Get full text
Thesis -
14
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
15
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…This thesis proposed a digital text based watermarking algorithm combined with Pseudo-Random Number Generator(PRNG) for cryptography application. …”
Get full text
Get full text
Get full text
Thesis -
16
Design and implementation of a new multilevel inverter topology with shared power switches / Jafferi bin Jamaludin
Published 2014“…The hardware prototype of the proposed multilevel inverter using digital signal processors (DSPs) in implementing the proposed modulation and current control algorithms has been developed for validation.…”
Get full text
Get full text
Thesis -
17
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…The hierarchical fuzzy clustering algorithm developed in this work assign the overlapping structures (structures having more than one activity) to more than one clusters if their fuzzy membership values are significantly high for those clusters. …”
Get full text
Get full text
Monograph -
18
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Third, this thesis focuses around the objective of developing a resource-based content adaptation system. …”
Get full text
Get full text
Thesis -
19
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
20
The effectiveness of bottom up technique with probabilistic approach for a Malay parser
Published 2018“…The bottom up parsing will be supported by implementing Cocke–Younger–Kasami (CYK) algorithm. The parser’s performance is evaluated based on its effectiveness to overcome ambiguity by suggesting a more precise parse tree. …”
Get full text
Get full text
Get full text
Article
