Search Results - (( java implementation using algorithm ) OR ( using string (matching OR machine) algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- using string »
-
1
GPU-based odd and even hybrid string matching algorithm
Published 2016“…Experimental results indicate that the performance of the hybrid string matching algorithms has been improved, and the speedup, which has been obtained, is considerable enough to suggest the GPU as the suitable platform for these hybrid string-matching algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
Published 2007Get full text
Get full text
Conference or Workshop Item -
4
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
5
KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming
Published 2023“…The algorithm used in this research is KNN, which was chosen because the variable has a numeric data type to perform the matching. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
7
-
8
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
Get full text
Get full text
Thesis -
11
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
12
Speeding up index construction with GPU for DNA data sequences
Published 2011“…The advancement of technology in scientific community has produced terabytes of biological data.This datum includes DNA sequences.String matching algorithm which is traditionally used to match DNA sequences now takes much longer time to execute because of the large size of DNA data and also the small number of alphabets.To overcome this problem, the indexing methods such as suffix arrays or suffix trees have been introduced.In this study we used suffix arrays as indexing algorithm because it is more applicable, not complex and used less space compared to suffix trees.The parallel method is then introduced to speed up the index construction process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…Record linkage is a technique which is used to detect and match duplicate records which are generated in data integration process. …”
Get full text
Thesis -
14
Embedded car plate image recognition system
Published 2008“…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
Get full text
Learning Object -
15
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
16
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
Optimization of job scheduling in a machine shop using genetic algorithm
Published 2002“…As job scheduling involves allocation of jobs to machines to reduce the idle time of machines, the aim of this work emphasises on minimizing the cycle time by using genetic algorithm (GA). …”
Get full text
Get full text
Article -
19
Optimization of job scheduling in a machine shop using genetic algorithm
Published 2002“…As job scheduling involves allocation of jobs to machines to reduce the idle time of machines, the aim of this work emphasises on minimizing the cycle time by using genetic algorithm (GA). …”
Get full text
Get full text
Article -
20
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis
