Search Results - (( java implementation path algorithm ) OR ( using string ((_ algorithm) OR (based algorithm)) ))

Refine Results
  1. 1
  2. 2

    A hybrid database encryption algorithm based on reverse string and dynamic key by Abduljabbar, Waleed Khalid, Mohd Jamil, Jastini, Mohd Shaharanee, Izwan Nizal, Ahmed, Waleed K., Ali, Azhar Tareq

    Published 2016
    “…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    GPU-based odd and even hybrid string matching algorithm by Rahbari, Ghazal, Abdul Rashid, Nur’Aini, Husain, Wahidah

    Published 2016
    “…Experimental results indicate that the performance of the hybrid string matching algorithms has been improved, and the speedup, which has been obtained, is considerable enough to suggest the GPU as the suitable platform for these hybrid string-matching algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Optimisation of corona ring design and its impact on the performance of insulator string in high voltage transmission lines / Kalaiselvi Aramugam by Kalaiselvi , Aramugam

    Published 2022
    “…However, installing a corona ring with an optimum design to reduce the electric field magnitude on an insulator string is a challenging task. Therefore, in this work, a method to achieve an optimum design of a corona ring for a 33 kV and 132 kV composite non-ceramic insulator string was proposed using optimisation methods; Gravitational Search Algorithm (GSA), Imperialist Competitive Algorithm (ICA) and Grey Wolf Optimisation (GWO). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design of digital circuit structure based on evolutionary algorithm method by Chong, Kok Hen, Aris, Ishak, Bashi, Senan Mahmood, Koh, Johnny Siaw Paw

    Published 2008
    “…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A new split based searching for exact pattern matching for natural texts by Hakak, Saqib Iqbal, Kamsin, Amirrudin, Shivakumara, Palaiahnakote, Idris, Mohd Yamani Idna, Gilkar, Gulshan Amin

    Published 2018
    “…In this work, we propose a novel idea to achieve both time efficiency and memory consumption by splitting query string for searching in Corpus. For a given text, the proposed algorithm split the query pattern into two equal halves and considers the second (right) half as a query string for searching in Corpus. …”
    Get full text
    Get full text
    Article
  15. 15

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Threshold value of DC array current and DC string voltage for fault detection in grid-connected photovoltaic system / Nurmalessa Muhammad … [et al.] by Muhammad, Nurmalessa, Zakaria, Nor Zaini, Shaari, Sulaiman, Omar, Ahmad Maliki

    Published 2020
    “…One of the methods in detecting failure is by using the threshold-based method to compute the ratio of actual and predicted DC array current and DC string voltage value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A novel secret key generation based on image link by Sulaiman A.H., Al-Shaikhli I.F.T., Wahiddin M.R., Houri S., Jamil N., Ismail A.F.

    Published 2023
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Article
  20. 20

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…As experimental results indicate, the combined similarity measure which is based on the combination of string and semantic similarity measures outperforms the string and semantic similarity measures, which are used individually, with the F-measure of 99.1% in Restaurant dataset, and 88.3% in Cora dataset. …”
    Get full text
    Thesis