Search Results - (( problem string _ algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- problem string »
-
1
-
2
String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi...
Published 1999“…Dynamic programming is used to solve both the String Distance Problem and Longest Common Subsequence (LCS) problem. …”
Get full text
Get full text
Thesis -
3
GPU-based odd and even hybrid string matching algorithm
Published 2016“…Experimental results indicate that the performance of the hybrid string matching algorithms has been improved, and the speedup, which has been obtained, is considerable enough to suggest the GPU as the suitable platform for these hybrid string-matching algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
5
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…Dijkstra's Algorithm is one of them. This approach solves the single-source shortest path problem with nonnegative edge weights. …”
Get full text
Get full text
Thesis -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Simulation of vibrating string
Published 2001“…This project illustrates the steps involved in the computer simulation of a physical phenomenon by considering the problem of wave propagation in a thin elastic string. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
8
KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming
Published 2023“…It proves that the proposed method can classify string data types.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Design of digital circuit structure based on evolutionary algorithm method
Published 2008“…It is largely applied to complex optimization problems. EAs introduce a new idea for automatic design of electronic systems; instead of imagine model, abstractions, and conventional techniques, it uses search algorithm to design a circuit. …”
Get full text
Get full text
Get full text
Article -
10
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…Thus, the objective of this research is to enhance the BA to overcome these problems. The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
11
Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin
Published 2001“…Longest Common Subsequence algorithm (LCS) has been developed to solve string matching problems. …”
Get full text
Get full text
Thesis -
12
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
Get full text
Get full text
Thesis -
13
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Get full text
Get full text
Article -
14
Genetic Mutation of Cowpea as a Constrained Stochastic Optimization Problem in Sustainability
Published 2023“…Our experiments with genetic algorithm as a stochastic optimizer, confirmed that the evolution from the initial random string (initial cowpea species) to the target string (optimal cowpea solution) was smeared by uncertainties in the optimization-for-sustainability effort. …”
Get full text
Get full text
Get full text
Article -
15
A novel secret key generation based on image link
Published 2023“…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
Article -
16
Algorithm of the longest commonly consecutive word for plagiarism detection in text based document
Published 2008“…Plagiarism is a form of academic misconduct which has increased with the easy access to obtain information through electronic documents and the Internet. The problem of finding document plagiarism in full text document can be viewed as a problem of finding the longest common parts of strings.Moreover, the detection system has to be capable to determine and visualize not only the common parts but also the location of the common parts in both the source and the observed document. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A novel secret key generation based on image link
Published 2018“…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
Get full text
Get full text
Get full text
Article -
19
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
20
DNA Computing Technique to Solve Vertex Coloring Problem
Published 2013“…In this paper we proposed DNA based computer to solve vertex coloring problem where in this paper we proposed DNA encoding and computational procedure inspired by greedy algorithm to generate all possible solutions to coloring a graph.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
