Search Results - (( java application search algorithm ) OR ( using interactive protocol algorithm ))

Refine Results
  1. 1

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  2. 2

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Deniable authentication protocol based on factoring and discrete logarithm problems by Nek Abd Rahman, Normahirah, Ismail, Eddie Shahril, Laham, Mohamed Faris

    Published 2022
    “…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Evolutionary Music; Composing Beats and Chords Progression by Ng, Hayden

    Published 2020
    “…Evoluthm utilizes Harmony Search Algorithm and JFUGUE techniques in compliances with artificial intelligence (AI). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Quality of service performances of three mobile ad hoc network protocols by Adam, Nabilah

    Published 2009
    “…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…Therefore, there is a need for a technique which able to localize a fault effectively with less number of mutants generated. Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Multipath routing protocol based on cross-layer approach for MANET by Allahham, Alaa Azmi, Mohammed, Muamer N., Kadhim, Nassir Sallom

    Published 2017
    “…In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
    Get full text
    Get full text
    Thesis
  20. 20

    IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH by AHMED ALI ALSHAKHSI, SAMEHA

    Published 2013
    “…Voice over Internet Protocol (VoIP) is a technology that allows the transmission of voice packets over Internet Protocol (IP). …”
    Get full text
    Get full text
    Thesis