Search Results - (( java implication based algorithm ) OR ( using string means algorithm ))
Search alternatives:
- implication based »
- java implication »
- means algorithm »
- using string »
-
1
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…They are: 1) Reproduction means the creation of new generations, 2) Crossover means interchanging of parts of parent strings into the child string, and 3) Mutation means the random bit flip. …”
Get full text
Get full text
Thesis -
2
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
4
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
5
Embedded car plate image recognition system
Published 2008“…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
Get full text
Learning Object -
6
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…Specifically, a Great Value Priority binarization scheme is employed to transform the continuous location of the bat into a binary bit, representing a combination of the variable in binary string form. A comparative study was conducted, and the mean absolute error metric was used as the performance measure. …”
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
8
-
9
Meta search engine powered by DBpedia
Published 2012“…This semantic meta search engine also uses Google to generate the search results of a given query, explores the meaning of the query using DBPedia andfinally displays the results in cluster similar to the technique used by Yippy. …”
Get full text
Get full text
Research Report -
10
Design and modelling of an autonomous robotic airship with soft computing control
Published 2012“…The GPS and telemetry data were processed using string recognition methods.The processed and filtered telemetry and GPS data were fed to the fuzzy logic system. …”
Get full text
Get full text
Get full text
Thesis -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
13
-
14
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…When compared with industry standard methods, the neural networks show very poor performance when 2-D bit-strings descriptors are used. However, their relative performance improves when used with topological indices as descriptors. …”
Get full text
Get full text
Monograph -
15
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…The sentence selected for embedding watermarking bit are 85% higher in speed due to faster embedding watermarking bit string.The relation of information-hiding capacity is 1:5.5 which means that for every 5.5 terms of text, one bit of watermark can be hidden data. …”
Get full text
Get full text
Get full text
Thesis -
16
Advancing Predictive Maintenance: Median-Based Particle Filtering in MOSFET Prognostics
Published 2025“…To address this issue, we introduced a high-performance prognostic model that promises to take advantage of both the Adaptive Particle Filter (APF) and Gaussian Process Regression (GPR), which is called as PF-GPR method. The model used a genetic algorithm to control when and how many particles were adaptively resampled applying different weighted strategies (mean or median) in response of the stochastic system deterioration. …”
Article
