Search Results - (( programming string based algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi... by Mohd Ghazi, Mohd Razif

    Published 1999
    “…These are the Wagner & Fischer and Hirschberg algorithms. These methods were chosen because they are based on dynamic programming. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Word segmentation of output response for sign language devices by Za'bah, Nor Farahidah, Muhammad Nazmi, Ahmad Amierul Asyraf, Azman, Amelia Wong

    Published 2020
    “…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Retrieving translated Al-Quran documents using edit distance technique / Ahmad Syukri Mohamad Zaid by Mohamad Zaid, Ahmad Syukri

    Published 2001
    “…This paper describes features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm by Chong, Kok Hen

    Published 2008
    “…ODCSD is a digital circuit structure design simulation program. Further more, a prototype hardware has been designed and constructed to test the success chromosome string, which called as GA based Logic Implementer (GALI). …”
    Get full text
    Get full text
    Thesis
  11. 11

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In word segmentation, related algorithms can be divided into three categories: based on string matching, based on understand and based on statistics [1]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The development of the system is carried out using Matlab/Simulink incorporated with MPLAB programming for evaluating and validating the system. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item