Search Results - (( java application customization algorithm ) OR ( pattern string based algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2
  3. 3

    A novel secret key generation based on image link by Sulaiman A.H., Al-Shaikhli I.F.T., Wahiddin M.R., Houri S., Jamil N., Ismail A.F.

    Published 2023
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Article
  4. 4

    A novel secret key generation based on image link by Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil

    Published 2018
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Ensemble based categorization and adaptive model for malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2011
    “…Current malware detection method involved string search algorithm which based on the pattern detection. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In word segmentation, related algorithms can be divided into three categories: based on string matching, based on understand and based on statistics [1]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Meta search engine powered by DBpedia by Chin, Kim On, Patricia Anthony, Boo, Vooi Keong, Rosalam Sarbatly

    Published 2012
    “…The disambiguation that exists between several terms gives challenge on how a search engine should produce a search result since traditional search engines work based on pattern matching rather than the meaning of the term being queried. …”
    Get full text
    Get full text
    Research Report
  12. 12

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item