Search Results - (( developing string research algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- research algorithm »
- developing string »
- java application »
- string research »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
Get full text
Get full text
Thesis -
4
Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment
Published 2023“…Genetic Algorithm (GA) belongs to elementary stochastic optimization algorithms inspired by evolution.It points out the ability of simple representations using bit strings to encode complicated structures and the power of simple transformations to reach the desired solution. …”
Conference Paper -
5
Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin
Published 2001“…Longest Common Subsequence algorithm (LCS) has been developed to solve string matching problems. …”
Get full text
Get full text
Thesis -
6
-
7
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
8
Pharmacy stock inventory system
Published 2005“…As a final result,this system was fulfilled all the research objectives.This research was successfully developed the PSIS prototype system, computerized and optimized the current system using String Search Algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
9
Boyer-Moore horspool algorithm used in content management system of data fast searching
Published 2017“…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
11
Web application vulnerabilities detection model
Published 2016“…In addition, the proposed detection model will be able to generate the report regarding the level of vulnerability of the web application. The research will be carried out by using design string matching algorithm. …”
Get full text
Get full text
Research Reports -
12
Heartbeat disease diagnosis using text-based approaches
Published 2011“…However, to the best knowledge of the researcher, no prior study has encoded heart sound to text string. …”
Get full text
Get full text
Thesis -
13
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…The GA process (Inter Loop GA), crossover operator (Fix Multiple Point Crossover), mutation operator (Random Discrete Mask Mutation) and fitness function (Constraint Fitness and Gate Optimization Fitness) were developed in this research. The simulator called Optimal Digital Circuit Structure Designer (ODCSD) is also developed in this work. …”
Get full text
Get full text
Thesis -
14
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
15
-
16
Design and modelling of an autonomous robotic airship with soft computing control
Published 2012“…In recent years, with the development of advance soft computing control methods, countless research work have applied these controls system In their autonomous systems. …”
Get full text
Get full text
Get full text
Thesis -
17
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The longest common subsequence is a well-known string matching algorithm that we have utilized to find the most similar pattern between a set of navigation patterns and current user activities for creating the recommendations.…”
Get full text
Get full text
Thesis -
18
Design and implementation of a new multilevel inverter topology with shared power switches / Jafferi bin Jamaludin
Published 2014“…The hardware prototype of the proposed multilevel inverter using digital signal processors (DSPs) in implementing the proposed modulation and current control algorithms has been developed for validation.…”
Get full text
Get full text
Thesis -
19
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
20
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Our aim of this research is to compare and evaluate both Jaccard and Manhattan Distance algorithms in terms of their effectiveness to formulate the enhancement of the previous multi-factor weighted Approach. …”
Get full text
Get full text
Get full text
Article
