Search Results - (( java implication based algorithm ) OR ( using string means algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…They are: 1) Reproduction means the creation of new generations, 2) Crossover means interchanging of parts of parent strings into the child string, and 3) Mutation means the random bit flip. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded car plate image recognition system by Moo Wui Hung

    Published 2008
    “…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
    Get full text
    Learning Object
  6. 6

    The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…Specifically, a Great Value Priority binarization scheme is employed to transform the continuous location of the bat into a binary bit, representing a combination of the variable in binary string form. A comparative study was conducted, and the mean absolute error metric was used as the performance measure. …”
    Article
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Meta search engine powered by DBpedia by Chin, Kim On, Patricia Anthony, Boo, Vooi Keong, Rosalam Sarbatly

    Published 2012
    “…This semantic meta search engine also uses Google to generate the search results of a given query, explores the meaning of the query using DBPedia andfinally displays the results in cluster similar to the technique used by Yippy. …”
    Get full text
    Get full text
    Research Report
  10. 10

    Design and modelling of an autonomous robotic airship with soft computing control by Wong, Wei Kitt

    Published 2012
    “…The GPS and telemetry data were processed using string recognition methods.The processed and filtered telemetry and GPS data were fed to the fuzzy logic system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…When compared with industry standard methods, the neural networks show very poor performance when 2-D bit-strings descriptors are used. However, their relative performance improves when used with topological indices as descriptors. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…The sentence selected for embedding watermarking bit are 85% higher in speed due to faster embedding watermarking bit string.The relation of information-hiding capacity is 1:5.5 which means that for every 5.5 terms of text, one bit of watermark can be hidden data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Advancing Predictive Maintenance: Median-Based Particle Filtering in MOSFET Prognostics by Hadi E.F., Baharuddin M.Z.B., Zuhdi A.W.M.

    Published 2025
    “…To address this issue, we introduced a high-performance prognostic model that promises to take advantage of both the Adaptive Particle Filter (APF) and Gaussian Process Regression (GPR), which is called as PF-GPR method. The model used a genetic algorithm to control when and how many particles were adaptively resampled applying different weighted strategies (mean or median) in response of the stochastic system deterioration. …”
    Article