Search Results - (( java implementation _ algorithm ) OR ( using string based algorithm ))
Search alternatives:
- java implementation »
- using string »
- string based »
-
1
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
2
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi...
Published 1999“…Dynamic programming is used to solve both the String Distance Problem and Longest Common Subsequence (LCS) problem. …”
Get full text
Get full text
Thesis -
4
GPU-based odd and even hybrid string matching algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Optimisation of corona ring design and its impact on the performance of insulator string in high voltage transmission lines / Kalaiselvi Aramugam
Published 2022“…However, installing a corona ring with an optimum design to reduce the electric field magnitude on an insulator string is a challenging task. Therefore, in this work, a method to achieve an optimum design of a corona ring for a 33 kV and 132 kV composite non-ceramic insulator string was proposed using optimisation methods; Gravitational Search Algorithm (GSA), Imperialist Competitive Algorithm (ICA) and Grey Wolf Optimisation (GWO). …”
Get full text
Get full text
Thesis -
7
-
8
An Algorithm for Automatically Updating a Forsyth-Edwards Notation String without an Array Board Representation
Published 2023Conference Paper -
9
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…As experimental results indicate, the combined similarity measure which is based on the combination of string and semantic similarity measures outperforms the string and semantic similarity measures, which are used individually, with the F-measure of 99.1% in Restaurant dataset, and 88.3% in Cora dataset. …”
Get full text
Thesis -
13
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
16
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
17
Design of digital circuit structure based on evolutionary algorithm method
Published 2008“…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Threshold value of DC array current and DC string voltage for fault detection in grid-connected photovoltaic system / Nurmalessa Muhammad … [et al.]
Published 2020“…One of the methods in detecting failure is by using the threshold-based method to compute the ratio of actual and predicted DC array current and DC string voltage value. …”
Get full text
Get full text
Get full text
Get full text
Article
