Search Results - (( java implementation modified algorithm ) OR ( using string _ algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using string »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
3
String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi...
Published 1999“…Dynamic programming is used to solve both the String Distance Problem and Longest Common Subsequence (LCS) problem. …”
Get full text
Get full text
Thesis -
4
GPU-based odd and even hybrid string matching algorithm
Published 2016“…Experimental results indicate that the performance of the hybrid string matching algorithms has been improved, and the speedup, which has been obtained, is considerable enough to suggest the GPU as the suitable platform for these hybrid string-matching algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…While the dynamic string transformation increase the difficulty level of predicting the substitution table used. …”
Get full text
Get full text
Article -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
7
Optimisation of corona ring design and its impact on the performance of insulator string in high voltage transmission lines / Kalaiselvi Aramugam
Published 2022“…However, installing a corona ring with an optimum design to reduce the electric field magnitude on an insulator string is a challenging task. Therefore, in this work, a method to achieve an optimum design of a corona ring for a 33 kV and 132 kV composite non-ceramic insulator string was proposed using optimisation methods; Gravitational Search Algorithm (GSA), Imperialist Competitive Algorithm (ICA) and Grey Wolf Optimisation (GWO). …”
Get full text
Get full text
Thesis -
8
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An Algorithm for Automatically Updating a Forsyth-Edwards Notation String without an Array Board Representation
Published 2023Conference Paper -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
Published 2007Get full text
Get full text
Conference or Workshop Item -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
16
Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system: article / Wan Nur Liyana Wan Abd Rahman
Published 2013“…This paper presented the configuration of a photovoltaic (PV) array of a grid-connected photovoltaic (GCPV) system by using Cuckoo Search (CS) algorithm. The best PV module and inverter that can produce the optimal number of PV modules per strings and the optimal number of parallel PV strings was determined by using CS in order to make the GCPV system produce higher expected annual energy output with the given roof space.…”
Get full text
Get full text
Article -
17
Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system / Wan Nur Liyana Wan Abd Rahman
Published 2013“…This paper presented the configuration of a photovoltaic (PV) array of a grid-connected photovoltaic (GCPV) system by using Cuckoo Search (CS) algorithm. The best PV module and inverter that can produce the optimal number of PV modules per strings and the optimal number of parallel PV strings was determined by using CS in order to make the GCPV system produce higher expected annual energy output with the given roof space.…”
Get full text
Get full text
Thesis -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming
Published 2023“…However, sometimes, the matching does not only use variable data types. In some cases, the available variables are string data types. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Particle swarm optimization for NARX structure selection application on DC motor model: article / Mohd I. Abdullah
“…By representing its particles technique as probabilities of change (bit flip) of a binary string, the binary string was then used to select a set of repressors as the model structure, and the parameter estimated using QR decomposition.…”
Get full text
Get full text
Article
