Search Results - (( problem string based algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Design of digital circuit structure based on evolutionary algorithm method by Chong, Kok Hen, Aris, Ishak, Bashi, Senan Mahmood, Koh, Johnny Siaw Paw

    Published 2008
    “…It is largely applied to complex optimization problems. EAs introduce a new idea for automatic design of electronic systems; instead of imagine model, abstractions, and conventional techniques, it uses search algorithm to design a circuit. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    A novel secret key generation based on image link by Sulaiman A.H., Al-Shaikhli I.F.T., Wahiddin M.R., Houri S., Jamil N., Ismail A.F.

    Published 2023
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Article
  7. 7

    Algorithm of the longest commonly consecutive word for plagiarism detection in text based document by Sediyono, Agung, Ku-Mahamud, Ku Ruhana

    Published 2008
    “…Based on the experiment, the proposed algorithm outperforms the suffix tree in the length of observed paragraph below one hundred words.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A novel secret key generation based on image link by Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil

    Published 2018
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Heartbeat disease diagnosis using text-based approaches by Khorasani, Ehsan Safar

    Published 2011
    “…The MIDI files are then encoded to text strings using the pitch and duration information based on n-gram, these text strings then form musical words. …”
    Get full text
    Get full text
    Thesis
  13. 13

    DNA Computing Technique to Solve Vertex Coloring Problem by Hasudungan, Rofilde, Rohani, Abu Bakar

    Published 2013
    “…In this paper we proposed DNA based computer to solve vertex coloring problem where in this paper we proposed DNA encoding and computational procedure inspired by greedy algorithm to generate all possible solutions to coloring a graph.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Metaheuristic nature-inspired algorithms for reservoir optimization operation: A systematic literature review by Nor Shuhada, Ibrahim, Nafrizuan, Mat Yahya, Saiful Bahri, Mohamed

    Published 2022
    “…Hence, this presented study reviewed a considerable amount from the previous studies of commonly nature-based optimization algorithms applied in reservoir operations. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Ensemble based categorization and adaptive model for malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2011
    “…Current malware detection method involved string search algorithm which based on the pattern detection. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
    Get full text
    Thesis
  19. 19

    The effectiveness of bottom up technique with probabilistic approach for a Malay parser by Muhammad Azhar Fairuzz Hiloh, Mohd Juzaiddin Ab Aziz, Lailatul Qadri Zakaria

    Published 2018
    “…The bottom up parsing will be supported by implementing Cocke–Younger–Kasami (CYK) algorithm. The parser’s performance is evaluated based on its effectiveness to overcome ambiguity by suggesting a more precise parse tree. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…This thesis proposed a digital text based watermarking algorithm combined with Pseudo-Random Number Generator(PRNG) for cryptography application. …”
    Get full text
    Get full text
    Get full text
    Thesis