Zobrazeno 1 - 10
of 355
pro vyhledávání: '"Rabin–Karp algorithm"'
Autor:
Irma Handayani, Anita Fira Waluyo
Publikováno v:
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Vol 18, Iss 4 (2024)
Kemajuan teknologi yang pesat telah mempermudah segala hal, termasuk dalam bidang pendidikan. Namun, kecanggihan tersebut juga mengakibatkan penyalahgunaan teknologi, terutama dalam hal duplikasi atau plagiarisme. Masalah ini tidak hanya terjadi pada
Externí odkaz:
https://doaj.org/article/48a20a7ab1d24f65aec80b6d9694b040
Publikováno v:
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Vol 16, Iss 1, Pp 11-22 (2022)
The Rabin-Karp algorithm is used to detect similarity using hashing techniques, from related studies modifications have been made in the hashing process but in previous studies have not been conducted research for the best k value in the K-Gram proce
Externí odkaz:
https://doaj.org/article/e84187d629ea49ff86d30bba2cde9150
Autor:
Fariha Iffath, A. S. M. Kayes, Md. Tahsin Rahman, Jannatul Ferdows, Mohammad Shamsul Arefin, Md. Sabir Hossain
Publikováno v:
Computers, Vol 10, Iss 4, p 47 (2021)
A programming contest generally involves the host presenting a set of logical and mathematical problems to the contestants. The contestants are required to write computer programs that are capable of solving these problems. An online judge system is
Externí odkaz:
https://doaj.org/article/f719349cbaad44448d6d5a4f82af3374
Autor:
Andysah Putera Utama Siahaan
The Rabin-Karp algorithm is known as the algorithm used to analyze a document based on a hash value. This algorithm is not for testing the image pattern. However, hash value can be occupied to compare the images patterns. K-Gram is a hash value-formi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee20ca99d4125b93a225257f14a5d58f
Publikováno v:
IEICE Transactions on Information and Systems. :2412-2420
Autor:
Jan Carlo Arroyo, Allemar Jhone Delima
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 9:3746-3751
Publikováno v:
2021 5th International Conference on Electrical, Telecommunication and Computer Engineering (ELTICOM).
Nowadays Graphic Design becomes a visual communication media that combines appearances, letters, and images as a language to communicate visually. There are many beginner circles and communities that have not yet known various terms in the world of g
Autor:
Mazen Ibrahim AlZubi, Ibrahim Obeidat
Publikováno v:
International Journal of Computing. :278-284
Fast pattern matching algorithms mostly used by IDS, which are considered one of the important systems used to monitor and analyze host and network traffic. Their main function is to detect various types of malicious and malware files by examining in
Publikováno v:
MECO
Nowadays the amount of information that is on the web is considerable. Students who prepare projects, seminars or diploma theses can copy others ideas, results or papers from from the internet. The information they copy and use as their own without r
Autor:
Abhigyan Tiwary, Nidhi Ruthia
Publikováno v:
Social Networking and Computational Intelligence ISBN: 9789811520709
Document spam is the term which is related to the document copyright issue. It deals with the plagiarism of content from a genuine copy to another. Many researches are performed around the globe for the sake of improvement in different fields such as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7b9514f014f1786c090b0283218b66b8
https://doi.org/10.1007/978-981-15-2071-6_25
https://doi.org/10.1007/978-981-15-2071-6_25