SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 5, October 2020, pp. 2517~2524
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i5.14882  2517
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Comparison of search algorithms in Javanese-Indonesian
dictionary application
Yana Aditia Gerhana1
, Nur Lukman2
, Arief Fatchul Huda3
, Cecep Nurul Alam4
,
Undang Syaripudin5
, Devi Novitasari6
1-6
Department of Informatics, Faculty of Science and Technology,
Universitas Islam Negeri Sunan Gunung Djati, Indonesia
1,4,5
Information Communication Technology, Asia e University Malaysia, Malaysia
Article Info ABSTRACT
Article history:
Received Jun 9, 2019
Revised Apr 9, 2020
Accepted May 1, 2020
This study aims to compare the performance of Boyer-Moore, Knuth morris
pratt, and Horspool algorithms in searching for the meaning of words in
the Java-Indonesian dictionary search application in terms of accuracy and
processing time. Performance Testing is used to test the performance of
algorithm implementations in applications. The test results show that
the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of
100%, and the Horspool algorithm 85.3%. While the processing time, Knuth
Morris Pratt algorithm has the highest average speed level of 25ms,
Horspool 39.9 ms, while the average speed of the Boyer Moore algorithm is
44.2 ms. While the complexity test results, the Boyer Moore algorithm has
an overall number of n 26n2
, Knuth Morris Pratt and Horspool 20n2
each.
Keywords:
Boyer-Moore
Complexity text mining
Horspool
Knuth Morris Pratt
Performace
Searching
This is an open access article under the CC BY-SA license.
Corresponding Author:
Nur Lukman,
Department of Informatics, Faculty of Science and Technology,
Universitas Islam Negeri Sunan Gunung Djati,
A. H. Nasution St. no. 105, Cibiru-Bandung, Indonesia.
Email: n.lukman@uinsgd.ac.id
1. INTRODUCTION
Search algorithm is one of the fundamental research studies in computer science [1-8], including its
use in dictionaries. A dictionary is a tool used by someone to learn languages, both international, national, and
regional languages. The process of searching vocabulary in a dictionary application requires time in the search
process to issue a translation of the word being searched. The search process generally uses a string matching
algorithm as a data search algorithm [9-13]. The purpose of using a string matching algorithm, also, to speed
up the search process also aims to obtain the accuracy of search results. Several algorithms are belonging to
this string algorithm, including the Boyer-Moore algorithm, Horspool algorithm, Knuth Morris Pratt algorithm,
and others [14-16].
Research that explains the implementation and updating of matching strings has been discussed in
previous studies [1, 4, 7, 12, 15, 17, 18]. Based on research that has been done before, this research tries to
develop a Java-Indonesian language di ctionary application, by comparing the performance of several Boyer
Moore string data search algorithms. Knuth Morris Pratt and the Horspool algorithm with the addition of
the Speech To Text feature to the application. These three algorithms are the best string matching algorithm,
which has different table shifts which can search data faster than other algorithms [3-5, 19, 20]. Performance
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524
2518
that is compared is the value of accuracy and average processing time of search results, so we know which
string matching algorithm is the best to develop in future research.
2. RESEARCH METHOD
The performance testing method is used to test the performance of three string matching algorithms,
namely the Boyer-Moore algorithm, the Knuth Morris Pratt algorithm, and the Horspool algorithm in
the Indonesian-Javanese dictionary application. Performance is measured based on the level of accuracy and
the level of speed in the search process time in the application. Performance analysis is carried out in several
stages. The first stage is the input stage of the vocabulary or data string, the second stage is the process of
searching for string data using one of the string algorithms. Figure 1 explains the stages of algorithm
performance analysis. The stage is called pre-processing which is a phase of text mining which is very
important [21, 22], pre-processing represents data to be more structured until the data is ready to be
processed [23] according to the algorithm used. The last stage is the output stage of the calculation process of
the algorithm used, in the form of a translation of the vocabulary or search string data.
Figure 1. Sistem flowchart running
2.1. Boyer-Moore algorithm
The Boyer-Moore algorithm becomes one of the most frequently used string-lookup algorithms or is
implemented into a document or data search feature in the database because it is considered the most efficient
in typical applications and is best compared to other string search algorithms [24, 25]. The Boyer-Moore
algorithm starts matching a character from the right direction of the pattern or the right-to-left direction of
the text [16, 26, 27]. Adequately systematic, the stages that the Boyer-Moore algorithm performed at the time
of matching the following strings [26, 28]:
a. Boyer-Moore's algorithm starts matching the pattern at the beginning of the text.
b. The Boyer-Moore algorithm will match from right-to-left to match the pattern character characters with
the characters in the matched text until one of the conditions is met.
The searching of data in Boyer Moore algorithm can be seen on the pattern to search the word “ALA” on
“BURUK ALA”.
a. Align the pattern of ALA, matched with BURUK ALA
Text : B U R U K A L A
Pattern : A L A
b. Determine the shift table BmBc and BmGs
Tables 1 and 2 explain the Boyer Moore algorithm in searching data that can be seen from the search
for the word you want to search (patterns). The BmBc value in Table 1 is obtained from the results of
enumeration starting from the string and then to the initial string, starting at the 0th index. Then record
the characters that have been found [26, 28, 29]. Table 2 explains the process of finding BmBC values.
The enumerator value will be added by 1 found this character has never been found before. Then back to
the previous position, the character "A" because the character "A" has been seen previously, the value of
the transfer is 1 [26, 28, 29].
c. Make the iteration table to the pattern matching with text
Table 3 explains the iteration pattern of text matching in the Boyer-Moore algorithm. Iteration in
the Boyer-Moor algorithm stops at the 4th iteration, meaning that the search for the word ALA in BURUK
TELKOMNIKA Telecommun Comput El Control 
Comparison of search algorithms in Javanese-Indonesian dictionary application (Yana Aditia Gerhana)
2519
ALA text is found in the 4th iteration. Iteration is carried out based on the value of the shifts in the BmBc and
BmGs tables and compares which shift value is highest between the two [26, 28, 29].
Table 1. BmBc value Table 2. BmGs value
Table BmBc
Index 0 1 2
Pattern A L A
BmBc 0 1 0
Table BmGs
Index 0 1 2
Pattern A L A
BmBc 3 3 1
Table 3. Boyer Moore algorithm alteration scheme
Indeks 0 1 2 3 4 5 6 7 8
1 B U R U K A L A
A L A
2 B U R U K A L A
A L A
3 B U R U K A L A
A L A
4 B U R U K A L A
Data Found A L A
2.2. Knuth Morris Pratt algorithm (KMP)
The KMP algorithm has a different shift than the Boyer-Moore algorithm. Broadly speaking the stages
in the KMP algorithm, when performing string matching are [16, 20, 22, 30]:
a. Algorithms KMP starts matching pattern at the beginning of the text
b. The KMP algorithm performs a shift or matching pattern character with text characters from left to right
by matching characters per character until one of the conditions is met.
The searching of data in Knuth Morris Pratt algorithm can be seen on the pattern to search the word
“ALA” on “BURUK ALA”.
a. Align the pattern of ALA, matched with BURUK ALA
Text : B U R U K A L A
Pattern : A L A
b. Determine the value of data fringe
In Table 4, the initial boundary value will always be 0. The boundary value is calculated based on
a character pattern only. If anyone appreciates the character in the pattern, then the edge value 1 and so on will
increase in value with the value j, and I shift to the next pattern character [16, 20, 22, 30].
Table 4. Pattern edge
Table Pattern edge
J 0 1 2
P(j) A L A
B(b) 0 0 1
c. Make the iteration table to the pattern matching with text
Table 5 explains the iteration pattern matching text on the KMP algorithm. The iteration of the KMP
algorithm is similar to the Boyer Moore algorithm; the iteration stops at the 4th iteration. In contrast to
the KMP Algorithm, the interaction process is not based on BmBc and BmGs tables but based on values from
the edges of the pattern.
Table 5. Knuth Morris pratt algorithm alteration scheme
Indeks 0 1 2 3 4 5 6 7 8
1 B U R U K A L A
A L A
2 B U R U K A L A
A L A
3 B U R U K A L A
A L A
4 B U R U K A L A
Data Found A L A
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524
2520
2.3. Horspool algorithm
The Horspool algorithm is one of the string search algorithms, which is a simplification of
the Boyer-Moore algorithm [15, 16, 31, 32]. The Horspool algorithm has a simpler shifting compared to
the Boyer-Moore algorithm. The Boyer-Moore algorithm has two shifting process functions, i.e., bad-character
shift and good-suffix shift, so the Horspool algorithm only uses one panning that is bad-character shifting [33].
The function preprocess pattern in the Horspool algorithm is by performing a jump based on
"bad-character" or based on the character mismatch in the pattern found in the text. Panning the Horspool
algorithm uses the rightmost character in the current text window to determine the shift distance to be
performed. The pattern will shift to the far right of the window until a match between the pattern character and
the text. The searching of data in Horspool algorithm can be seen on the pattern to search the word “ALA” on
“BURUK ALA”.
a. Align the pattern of ALA, matched with BURUK ALA
Text : B U R U K A L A
Pattern : A L A
b. Determine the shift table BmBc
Table 6 explains the initial interpretation of the Horspool algorithm. The matching process starts at
the 0th index or the character "A". Perform the previous position, and the enumerator value will be added 1 if
this character has never been found before, Step back to the previous position which is the character "A"
because the character "A" has been found before then the replacement value is 1. The final scheme of
the Horspool algorithm matching process is examined in Table 7. The last iteration determines the character
0 (blank) in the text does not match the character A in the pattern, so the matching process removes because
0 (empty) does not match.
Table 6. BmBc value
Table BmBc
Index 0 1 2
Pattern A L A
BmBs 0 1 0
Table 7. Horspool algorithm literacy schema
Indeks 0 1 2 3 4 5 6 7 8
1 B U R U K A L A
A L A
2 B U R U K A L A
A L A
3 B U R U K ? A L A
Data Not Found A L A
3. RESULTS AND ANALYSIS
Data used in the form of a vocabulary that will be translated into the Javanese language derived from
the existing Javanese dictionary. In the research that is being done this observation is done in the form of direct
observation of the use of Javanese language in the community that began to be shifted based on a journal or
article that writes directly about the alignment The use of Javanese language among the younger generation
and several journals that proves some matching string algorithms that can be used for comparison.
Figure 2 explains the test results of the three algorithms. Based on the results of testing of
1500 vocabularies with 400 experiments, the accuracy of the Horspool algorithm is lower than the KMP and
Boyer-Moor algorithms, with an accuracy rate of 85.3%, while the KMP and Boyer-Moor algorithms are 100%
respectively. Mathematically the test results are explained as follows:
Accuracy level = (Number of successful samples/total number of samples) x 100%
Accuracy of Boyer-Moore = (
400
400
) 𝑥100%= 100%
Accuracy of Akurasi KMP = (
400
400
) 𝑥100% = 100%
Accuracy of Akurasi Horspool = (
341
400
) 𝑥100% = 85.3%
TELKOMNIKA Telecommun Comput El Control 
Comparison of search algorithms in Javanese-Indonesian dictionary application (Yana Aditia Gerhana)
2521
Figure 3 explains the results of testing the time of the third algorithm search process. The speed of
the algorithm is tested based on the processing time in searching vocabulary. Based on the test results,
the algorithm that has the fastest speed is Knuth-Morris-Pratt with an average of 25 ms, Horspool 39.9 ms, and
Boyer Moore 44.2 ms. Figure 4 explains in detail the comparison graph of the speed of each algorithm
in searching each Javanese vocabulary into Indonesian where blue indicates Boyer Moore's algorithm, red
indicates Knuth Morris Pratt's algorithm, and green indicates Horspool's algorithm.
Figure 2. Accuracy algorithm
Figure 3. Average value of comparison algorithm at match speed level
Figure 4. Time execution algorithm
Testing algorithms based on the complexity of the algorithm, testing is conducted based on
the efficiency of how much space (space) and the time it takes for the algorithm to run every step by step
in the algorithm. After testing the three algorithms, obtained the result that Boyer Moore's algorithm has
an overall n total of 11n, with the amount of n2
as much as 26n2
. The algorithm of Knuth Morris Pratt algorithm
has an overall n of 8n and an amount of n2
as much as 20n2
, and the Horspool algorithm has a value of n
as much as 10n and value of n2
as much as 20n2
. Figure 5 explains that Knuth Morris Pratt's algorithm has
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524
2522
the best time efficiency with a sum value of N2
and the least n values compared to the Horspool algorithm and
Boyer Moore's algorithm, which means the time the algorithm process is Has the most rapid processing
efficiency rates compared to another algorithm.
Figure 5. Comparison of algorithm complexity testing
4. CONCLUSION
Based on the test results, Boyer-Moor and KMP have a higher level of accuracy compared to
the Horspool algorithm. While the average processing time of KMP is better than Horspool and Boyer-Moor.
The processing time is directly proportional to the efficiency produced by KMP, which is better than
the Boyer-Moor and Horspool algorithm, with the least number of n2
and n values.
REFERENCES
[1] M. Abdullahi, M. A. Ngadi, S. I. Dishing, S. M. Abdulhamid, and B. I. eel Ahmad, “An efficient symbiotic organisms
search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing
environment,” J. Netw. Comput. Appl., vol. 133, pp. 60-74, 2019.
[2] G. Li, H. Zhou, X. Jing, G. Tian, and L. Li, “An intelligent wheel position searching algorithm for cutting tool grooves
with diverse machining precision requirements,” Int. J. Mach. Tools Manuf., vol. 122, pp. 149-160, 2017.
[3] M. S. Sanaj and P. M. Joe Prathap, “Nature inspired chaotic squirrel search algorithm (CSSA) for multi objective
task scheduling in an IAAS cloud computing atmosphere,” Eng. Sci. Technol. an Int. J., 2019.
[4] J. Brandão, “A memory-based iterated local search algorithm for the multi-depot open vehicle routing problem,” Eur.
J. Oper. Res., vol. 284, no. 2, pp. 559-571, 2020.
[5] S. Makhdoomi and A. Askarzadeh, “Optimizing operation of a photovoltaic/diesel generator hybrid energy system
with pumped hydro storage by a modified crow search algorithm,” J. Energy Storage, vol. 27, 2020.
[6] M. Yarlagadda, K. Gangadhara Rao, and A. Srikrishna, “Frequent itemset-based feature selection and Rider Moth
Search Algorithm for document clustering,” J. King Saud Univ. -Comput. Inf. Sci., 2019.
[7] P. H. Xiao, B. W. Li, and S. B. Wang, “A coupled DEM-FTSM approach with a new cost-effective searching
algorithm of particles for gas-solid flow with heat transfer,” Int. J. Therm. Sci., vol. 143, pp. 52-3, 2019.
[8] E. H. Mohamed and E. M. Shokry, “QSST: A Quranic Semantic Search Tool based on word embedding,” J. King
Saud Univ.–Comput. Inf. Sci., 2020.
[9] S. T. Klein and D. Shapira, “The String-to-Dictionary Matching Problem," Proceedings of the Data Compression
Conference, vol. 55, no. 11, pp. 143-152, 2015.
[10] S. Das and K. Kapoor, “Weighted approximate parameterized string matching,” AKCE Int. J. Graphs Comb.,
vol. 14, no. 1, pp. 1-12, 2017.
[11] G. Didier and L. Tichit, “Designing optimal- and fast-on-average pattern matching algorithms,” arXiv:1604.08860v4, 2016.
[12] C. Ryu and K. Park, “Improved pattern-scan-order algorithms for string matching,” J. Discret. Algorithms, 2018.
[13] M. Xu, X. Jia, M. Pickering, and A. J. Plaza, “Cloud removal based on sparse representation via multitemporal
dictionary learning,” IEEE Trans. Geosci. Remote Sens., vol. 54, no. 5, pp. 2998–3006, 2016.
[14] M. Bhagya Sri, R. Bhavsar, and P. Narooka, “String Matching Algorithms,” Int. J. Eng. Comput. Sci., vol. 7, no. 3,
pp. 23769-23772, 2018.
[15] C. C. Hoong and M. A. Ameedeen, “Boyer-moore horspool algorithm used in content management system of data
fast searching,” Adv. Sci. Lett., vol. 23, no. 11, pp. 11387-90, 2017.
[16] D. Gurung, U. K. Chakraborty, and P. Sharma, “Intelligent Predictive String Search Algorithm,” Procedia Computer
Science, vol. 79, pp. 161-169, 2016.
[17] W. R. King, “Knowledge Management and Organizational Learning,” Annals of Information Systems 4, pp. 3-13, 2009.
[18] M. Morales, S. Scherer, and R. Levitan, “A Cross-modal Review of Indicators for Depression Detection Systems,”
Proceedings of the Fourth Workshop on Computational Linguistics and Clinical Psychology-From Linguistic Signal
to Clinical Reality, 2017.
TELKOMNIKA Telecommun Comput El Control 
Comparison of search algorithms in Javanese-Indonesian dictionary application (Yana Aditia Gerhana)
2523
[19] A. Kusnadi and A. K. Wicaksono, “Comparison of Horspool Algorithm and Zhu-Takaoka Algorithm in
Desktop-Based String Search,” J. Ultim. Comput., vol. 9, no. 1, pp. 12-16, 2017.
[20] W. Astuti, “Analysis of String Matching in These Title Using Knuth-Morris-Pratt (KMP) Algorithm,” Ilk. J. Ilm.,
vol. 9, no. 2, pp. 167-172, 2017.
[21] S. Vijayarani, M. J. Ilamathi, M. Nithya, A. Professor, and M. P. Research Scholar, “Preprocessing Techniques for
Text Mining -An Overview,” Int. J. Comput. Sci. Commun. Networks, vol. 5, no. 1, pp. 7-16, 2015.
[22] M. Bhagya Sri, R. Bhavsar, and P. Narooka, “String Matching Algorithms,” Int. J. Eng. Comput. Sci.,
pp. 23769-23772, 2018.
[23] C. Slamet, A. R. Atmadja, D. S. Maylawati, R. S. Lestari, W. Darmalaksana, and M. A. Ramdhani, “Automated Text
Summarization for Indonesian Article Using Vector Space Model,” IOP Conference Series: Materials Science and
Engineering, 2018.
[24] R. Y. Tsarev, A. S. Chernigovskiy, E. A. Tsareva, V. V. Brezitskaya, A. Y. Nikiforov, and N. A. Smirnov, “Combined
string searching algorithm based on knuth-morris-pratt and boyer-moore algorithms,” IOP Conference Series:
Materials Science and Engineering, 2016.
[25] R. Fitriyanto, A. Yudhana, and S. Sunardi, “Implementation SHA512 Hash Function and Boyer-Moore String
Matching Algorithm for Jpeg/exif Message Digest Compilation,” J. Online Inform., vol. 4, no. 1, pp. 16-23, 2019.
[26] F. T. Waruwu and R. Mandala, “Comparison of Knuth Morris Pratt and Boyer Moore Algorithms in Matching Strings
in Nias Language Dictionary Application,” J. Ilm. INFOTEK, vol. 1, no. 1, 2016.
[27] rachmad fitriyanto, A. Yudhana, and S. Sunardi, “Implementation SHA512 Hash Function and Boyer-Moore String
Matching Algorithm for Jpeg/exif Message Digest Compilation,” J. Online Inform., vol. 4, no. 1, pp. 16-23, 2019.
[28] J. Bhandari and A. Kumar, “String Matching Rules Used by Variants of Boter-Moore,” J. Glob. Res. Comput. Sci.,
vol. 5, no. 1, pp. 8-11, 2014.
[29] R. F. Rahmat, D. F. Prayoga, D. Gunawan, and O. S. Sitompul, “Boyer-Moore Algorithm in Retrieving Deleted Short
Message Service in Android Platform,” IOP Conf. Ser. Mater. Sci. Eng., vol. 308, no. 1, 2018.
[30] L. S. Riza, M. I. Firmansyah, H. Siregar, D. Budiana, and A. Rosales-Pérez, “Determining strategies on playing
badminton using the Knuth-Morris-Pratt algorithm,” TELKOMNIKA Telecommunication Computing Electronics and
Control, vol. 16, no. 6, pp. 2763-2770, 2018.
[31] R. A. Baeza-Yates and M. Régnier, “Average running time of the Boyer-Moore-Horspool algorithm,” Theor.
Comput. Sci., vol. 92, no. 1, pp. 19-31, 1992.
[32] L. Jun, Z. Zhuo, M. Juan, and L. Xingfeng, “Multi-pattern Matching Methods Based on Numerical Computation,”
TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 11, no. 3, pp. 1497-1505, 2013.
[33] A. Kusnadi and A. K. Wicaksono, “Comparison of the Horspool Algorithm and the Zhu-Takaoka Algorithm in
Desktop-Based String Search (in Bahasa: Perbandingan Algoritma Horspool dan Algoritma Zhu-Takaoka dalam
Pencarian String Berbasis Desktop),” J. Ultim. Comput., vol. 9, no. 1, pp. 12-16, 2017.
BIOGRAPHIES OF AUTHORS
Yana Aditia Gerhana is a lecturer from Informatic Engineering Faculty of Science and
Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized in artificial
intelligence information sistem and software engineering.
Nur Lukman is a lecturer from Informatic Engineering Faculty of Science and Technology
UIN Sunan Gunung Djati Bandung in Indonesia, specialized in Information System and
Computer Science.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524
2524
Arief Fatchul Huda is a lecturer from Mathematics Faculty of Science and Technology UIN
Sunan Gunung Djati Bandung in Indonesia, specialized in Image Processing and Spatio
Temporal Analysis.
Cecep Nurul Alam is a lecturer from Informatic Engineering Faculty of Science and
Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized Information System
and Computer Science.
Undang Syaripudin is a lecturer from Informatic Engineering Faculty of Science and
Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized Information System
and Computer Science.
Devi Novitasari is a Bachelor of Engineering of Sunan Gunung Djati State Islamic
University In 2018. After her bachelor degree, she gained considerable experience. Currently,
she work in company property in bandung as digital marketing and data administration.

More Related Content

What's hot

A Study of BFLOAT16 for Deep Learning Training
A Study of BFLOAT16 for Deep Learning TrainingA Study of BFLOAT16 for Deep Learning Training
A Study of BFLOAT16 for Deep Learning TrainingSubhajit Sahu
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)inventionjournals
 
An Alternative Genetic Algorithm to Optimize OSPF Weights
An Alternative Genetic Algorithm to Optimize OSPF WeightsAn Alternative Genetic Algorithm to Optimize OSPF Weights
An Alternative Genetic Algorithm to Optimize OSPF WeightsEM Legacy
 
Analysis of signal transition
Analysis of signal transitionAnalysis of signal transition
Analysis of signal transitioncsandit
 
Integration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisIntegration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisPatricia Tavares Boralli
 
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...CSCJournals
 
Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...
Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...
Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...Editor IJCATR
 
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy Logic
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy LogicImproved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy Logic
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy LogicTELKOMNIKA JOURNAL
 
BRE Phase I Progress Report
BRE Phase I Progress ReportBRE Phase I Progress Report
BRE Phase I Progress ReportColleen Chen
 
Application of three graph Laplacian based semisupervised learning methods to...
Application of three graph Laplacian based semisupervised learning methods to...Application of three graph Laplacian based semisupervised learning methods to...
Application of three graph Laplacian based semisupervised learning methods to...ijbbjournal
 
A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...IAEME Publication
 
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSREDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSVLSICS Design
 
Internet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain DemandsInternet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain DemandsEM Legacy
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSecij
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
Compression-Based Parts-of-Speech Tagger for The Arabic Language
Compression-Based Parts-of-Speech Tagger for The Arabic LanguageCompression-Based Parts-of-Speech Tagger for The Arabic Language
Compression-Based Parts-of-Speech Tagger for The Arabic LanguageCSCJournals
 
A Study on Optimization of Top-k Queries in Relational Databases
A Study on Optimization of Top-k Queries in Relational DatabasesA Study on Optimization of Top-k Queries in Relational Databases
A Study on Optimization of Top-k Queries in Relational DatabasesIOSR Journals
 
A Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph DatabasesA Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph DatabasesIJMER
 

What's hot (20)

A Study of BFLOAT16 for Deep Learning Training
A Study of BFLOAT16 for Deep Learning TrainingA Study of BFLOAT16 for Deep Learning Training
A Study of BFLOAT16 for Deep Learning Training
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
An Alternative Genetic Algorithm to Optimize OSPF Weights
An Alternative Genetic Algorithm to Optimize OSPF WeightsAn Alternative Genetic Algorithm to Optimize OSPF Weights
An Alternative Genetic Algorithm to Optimize OSPF Weights
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Analysis of signal transition
Analysis of signal transitionAnalysis of signal transition
Analysis of signal transition
 
Integration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisIntegration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysis
 
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Ex...
 
Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...
Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...
Presenting an Algorithm for Tasks Scheduling in Grid Environment along with I...
 
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy Logic
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy LogicImproved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy Logic
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy Logic
 
BRE Phase I Progress Report
BRE Phase I Progress ReportBRE Phase I Progress Report
BRE Phase I Progress Report
 
IP Address lookup using bit-shuffled trie=Article Review
IP Address lookup using bit-shuffled trie=Article ReviewIP Address lookup using bit-shuffled trie=Article Review
IP Address lookup using bit-shuffled trie=Article Review
 
Application of three graph Laplacian based semisupervised learning methods to...
Application of three graph Laplacian based semisupervised learning methods to...Application of three graph Laplacian based semisupervised learning methods to...
Application of three graph Laplacian based semisupervised learning methods to...
 
A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...
 
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSREDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
 
Internet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain DemandsInternet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain Demands
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
Compression-Based Parts-of-Speech Tagger for The Arabic Language
Compression-Based Parts-of-Speech Tagger for The Arabic LanguageCompression-Based Parts-of-Speech Tagger for The Arabic Language
Compression-Based Parts-of-Speech Tagger for The Arabic Language
 
A Study on Optimization of Top-k Queries in Relational Databases
A Study on Optimization of Top-k Queries in Relational DatabasesA Study on Optimization of Top-k Queries in Relational Databases
A Study on Optimization of Top-k Queries in Relational Databases
 
A Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph DatabasesA Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph Databases
 

Similar to Comparison of search algorithms in Javanese-Indonesian dictionary application

An Application of Pattern matching for Motif Identification
An Application of Pattern matching for Motif IdentificationAn Application of Pattern matching for Motif Identification
An Application of Pattern matching for Motif IdentificationCSCJournals
 
Parallel random projection using R high performance computing for planted mot...
Parallel random projection using R high performance computing for planted mot...Parallel random projection using R high performance computing for planted mot...
Parallel random projection using R high performance computing for planted mot...TELKOMNIKA JOURNAL
 
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming TELKOMNIKA JOURNAL
 
Enhancing three variants of harmony search algorithm for continuous optimizat...
Enhancing three variants of harmony search algorithm for continuous optimizat...Enhancing three variants of harmony search algorithm for continuous optimizat...
Enhancing three variants of harmony search algorithm for continuous optimizat...IJECEIAES
 
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? IJORCS
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...IJECEIAES
 
A Survey of String Matching Algorithms
A Survey of String Matching AlgorithmsA Survey of String Matching Algorithms
A Survey of String Matching AlgorithmsIJERA Editor
 
C03504013016
C03504013016C03504013016
C03504013016theijes
 
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSA COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSgerogepatton
 
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSA COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSgerogepatton
 
Bat Algorithm is Better Than Intermittent Search Strategy
Bat Algorithm is Better Than Intermittent Search StrategyBat Algorithm is Better Than Intermittent Search Strategy
Bat Algorithm is Better Than Intermittent Search StrategyXin-She Yang
 
IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...
IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...
IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...IRJET Journal
 
Variable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimizationVariable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimizationeSAT Publishing House
 
An Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch ListAn Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch ListNooria Sukmaningtyas
 
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSINGFEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSINGIJCI JOURNAL
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach IJCSIS Research Publications
 
Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...
Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...
Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...IDES Editor
 

Similar to Comparison of search algorithms in Javanese-Indonesian dictionary application (20)

An Application of Pattern matching for Motif Identification
An Application of Pattern matching for Motif IdentificationAn Application of Pattern matching for Motif Identification
An Application of Pattern matching for Motif Identification
 
Parallel random projection using R high performance computing for planted mot...
Parallel random projection using R high performance computing for planted mot...Parallel random projection using R high performance computing for planted mot...
Parallel random projection using R high performance computing for planted mot...
 
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
 
Enhancing three variants of harmony search algorithm for continuous optimizat...
Enhancing three variants of harmony search algorithm for continuous optimizat...Enhancing three variants of harmony search algorithm for continuous optimizat...
Enhancing three variants of harmony search algorithm for continuous optimizat...
 
Ijetr042101
Ijetr042101Ijetr042101
Ijetr042101
 
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
 
A Survey of String Matching Algorithms
A Survey of String Matching AlgorithmsA Survey of String Matching Algorithms
A Survey of String Matching Algorithms
 
C03504013016
C03504013016C03504013016
C03504013016
 
Jf3515881595
Jf3515881595Jf3515881595
Jf3515881595
 
Load balancing and handoff in lte
Load balancing and handoff in lteLoad balancing and handoff in lte
Load balancing and handoff in lte
 
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSA COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
 
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSA COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMS
 
Bat Algorithm is Better Than Intermittent Search Strategy
Bat Algorithm is Better Than Intermittent Search StrategyBat Algorithm is Better Than Intermittent Search Strategy
Bat Algorithm is Better Than Intermittent Search Strategy
 
IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...
IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...
IRJET- Bidirectional Graph Search Techniques for Finding Shortest Path in Ima...
 
Variable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimizationVariable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimization
 
An Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch ListAn Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch List
 
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSINGFEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach
 
Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...
Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...
Economic Load Dispatch Problem with Valve – Point Effect Using a Binary Bat A...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

Comparison of search algorithms in Javanese-Indonesian dictionary application

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 5, October 2020, pp. 2517~2524 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i5.14882  2517 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Comparison of search algorithms in Javanese-Indonesian dictionary application Yana Aditia Gerhana1 , Nur Lukman2 , Arief Fatchul Huda3 , Cecep Nurul Alam4 , Undang Syaripudin5 , Devi Novitasari6 1-6 Department of Informatics, Faculty of Science and Technology, Universitas Islam Negeri Sunan Gunung Djati, Indonesia 1,4,5 Information Communication Technology, Asia e University Malaysia, Malaysia Article Info ABSTRACT Article history: Received Jun 9, 2019 Revised Apr 9, 2020 Accepted May 1, 2020 This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. While the processing time, Knuth Morris Pratt algorithm has the highest average speed level of 25ms, Horspool 39.9 ms, while the average speed of the Boyer Moore algorithm is 44.2 ms. While the complexity test results, the Boyer Moore algorithm has an overall number of n 26n2 , Knuth Morris Pratt and Horspool 20n2 each. Keywords: Boyer-Moore Complexity text mining Horspool Knuth Morris Pratt Performace Searching This is an open access article under the CC BY-SA license. Corresponding Author: Nur Lukman, Department of Informatics, Faculty of Science and Technology, Universitas Islam Negeri Sunan Gunung Djati, A. H. Nasution St. no. 105, Cibiru-Bandung, Indonesia. Email: n.lukman@uinsgd.ac.id 1. INTRODUCTION Search algorithm is one of the fundamental research studies in computer science [1-8], including its use in dictionaries. A dictionary is a tool used by someone to learn languages, both international, national, and regional languages. The process of searching vocabulary in a dictionary application requires time in the search process to issue a translation of the word being searched. The search process generally uses a string matching algorithm as a data search algorithm [9-13]. The purpose of using a string matching algorithm, also, to speed up the search process also aims to obtain the accuracy of search results. Several algorithms are belonging to this string algorithm, including the Boyer-Moore algorithm, Horspool algorithm, Knuth Morris Pratt algorithm, and others [14-16]. Research that explains the implementation and updating of matching strings has been discussed in previous studies [1, 4, 7, 12, 15, 17, 18]. Based on research that has been done before, this research tries to develop a Java-Indonesian language di ctionary application, by comparing the performance of several Boyer Moore string data search algorithms. Knuth Morris Pratt and the Horspool algorithm with the addition of the Speech To Text feature to the application. These three algorithms are the best string matching algorithm, which has different table shifts which can search data faster than other algorithms [3-5, 19, 20]. Performance
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524 2518 that is compared is the value of accuracy and average processing time of search results, so we know which string matching algorithm is the best to develop in future research. 2. RESEARCH METHOD The performance testing method is used to test the performance of three string matching algorithms, namely the Boyer-Moore algorithm, the Knuth Morris Pratt algorithm, and the Horspool algorithm in the Indonesian-Javanese dictionary application. Performance is measured based on the level of accuracy and the level of speed in the search process time in the application. Performance analysis is carried out in several stages. The first stage is the input stage of the vocabulary or data string, the second stage is the process of searching for string data using one of the string algorithms. Figure 1 explains the stages of algorithm performance analysis. The stage is called pre-processing which is a phase of text mining which is very important [21, 22], pre-processing represents data to be more structured until the data is ready to be processed [23] according to the algorithm used. The last stage is the output stage of the calculation process of the algorithm used, in the form of a translation of the vocabulary or search string data. Figure 1. Sistem flowchart running 2.1. Boyer-Moore algorithm The Boyer-Moore algorithm becomes one of the most frequently used string-lookup algorithms or is implemented into a document or data search feature in the database because it is considered the most efficient in typical applications and is best compared to other string search algorithms [24, 25]. The Boyer-Moore algorithm starts matching a character from the right direction of the pattern or the right-to-left direction of the text [16, 26, 27]. Adequately systematic, the stages that the Boyer-Moore algorithm performed at the time of matching the following strings [26, 28]: a. Boyer-Moore's algorithm starts matching the pattern at the beginning of the text. b. The Boyer-Moore algorithm will match from right-to-left to match the pattern character characters with the characters in the matched text until one of the conditions is met. The searching of data in Boyer Moore algorithm can be seen on the pattern to search the word “ALA” on “BURUK ALA”. a. Align the pattern of ALA, matched with BURUK ALA Text : B U R U K A L A Pattern : A L A b. Determine the shift table BmBc and BmGs Tables 1 and 2 explain the Boyer Moore algorithm in searching data that can be seen from the search for the word you want to search (patterns). The BmBc value in Table 1 is obtained from the results of enumeration starting from the string and then to the initial string, starting at the 0th index. Then record the characters that have been found [26, 28, 29]. Table 2 explains the process of finding BmBC values. The enumerator value will be added by 1 found this character has never been found before. Then back to the previous position, the character "A" because the character "A" has been seen previously, the value of the transfer is 1 [26, 28, 29]. c. Make the iteration table to the pattern matching with text Table 3 explains the iteration pattern of text matching in the Boyer-Moore algorithm. Iteration in the Boyer-Moor algorithm stops at the 4th iteration, meaning that the search for the word ALA in BURUK
  • 3. TELKOMNIKA Telecommun Comput El Control  Comparison of search algorithms in Javanese-Indonesian dictionary application (Yana Aditia Gerhana) 2519 ALA text is found in the 4th iteration. Iteration is carried out based on the value of the shifts in the BmBc and BmGs tables and compares which shift value is highest between the two [26, 28, 29]. Table 1. BmBc value Table 2. BmGs value Table BmBc Index 0 1 2 Pattern A L A BmBc 0 1 0 Table BmGs Index 0 1 2 Pattern A L A BmBc 3 3 1 Table 3. Boyer Moore algorithm alteration scheme Indeks 0 1 2 3 4 5 6 7 8 1 B U R U K A L A A L A 2 B U R U K A L A A L A 3 B U R U K A L A A L A 4 B U R U K A L A Data Found A L A 2.2. Knuth Morris Pratt algorithm (KMP) The KMP algorithm has a different shift than the Boyer-Moore algorithm. Broadly speaking the stages in the KMP algorithm, when performing string matching are [16, 20, 22, 30]: a. Algorithms KMP starts matching pattern at the beginning of the text b. The KMP algorithm performs a shift or matching pattern character with text characters from left to right by matching characters per character until one of the conditions is met. The searching of data in Knuth Morris Pratt algorithm can be seen on the pattern to search the word “ALA” on “BURUK ALA”. a. Align the pattern of ALA, matched with BURUK ALA Text : B U R U K A L A Pattern : A L A b. Determine the value of data fringe In Table 4, the initial boundary value will always be 0. The boundary value is calculated based on a character pattern only. If anyone appreciates the character in the pattern, then the edge value 1 and so on will increase in value with the value j, and I shift to the next pattern character [16, 20, 22, 30]. Table 4. Pattern edge Table Pattern edge J 0 1 2 P(j) A L A B(b) 0 0 1 c. Make the iteration table to the pattern matching with text Table 5 explains the iteration pattern matching text on the KMP algorithm. The iteration of the KMP algorithm is similar to the Boyer Moore algorithm; the iteration stops at the 4th iteration. In contrast to the KMP Algorithm, the interaction process is not based on BmBc and BmGs tables but based on values from the edges of the pattern. Table 5. Knuth Morris pratt algorithm alteration scheme Indeks 0 1 2 3 4 5 6 7 8 1 B U R U K A L A A L A 2 B U R U K A L A A L A 3 B U R U K A L A A L A 4 B U R U K A L A Data Found A L A
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524 2520 2.3. Horspool algorithm The Horspool algorithm is one of the string search algorithms, which is a simplification of the Boyer-Moore algorithm [15, 16, 31, 32]. The Horspool algorithm has a simpler shifting compared to the Boyer-Moore algorithm. The Boyer-Moore algorithm has two shifting process functions, i.e., bad-character shift and good-suffix shift, so the Horspool algorithm only uses one panning that is bad-character shifting [33]. The function preprocess pattern in the Horspool algorithm is by performing a jump based on "bad-character" or based on the character mismatch in the pattern found in the text. Panning the Horspool algorithm uses the rightmost character in the current text window to determine the shift distance to be performed. The pattern will shift to the far right of the window until a match between the pattern character and the text. The searching of data in Horspool algorithm can be seen on the pattern to search the word “ALA” on “BURUK ALA”. a. Align the pattern of ALA, matched with BURUK ALA Text : B U R U K A L A Pattern : A L A b. Determine the shift table BmBc Table 6 explains the initial interpretation of the Horspool algorithm. The matching process starts at the 0th index or the character "A". Perform the previous position, and the enumerator value will be added 1 if this character has never been found before, Step back to the previous position which is the character "A" because the character "A" has been found before then the replacement value is 1. The final scheme of the Horspool algorithm matching process is examined in Table 7. The last iteration determines the character 0 (blank) in the text does not match the character A in the pattern, so the matching process removes because 0 (empty) does not match. Table 6. BmBc value Table BmBc Index 0 1 2 Pattern A L A BmBs 0 1 0 Table 7. Horspool algorithm literacy schema Indeks 0 1 2 3 4 5 6 7 8 1 B U R U K A L A A L A 2 B U R U K A L A A L A 3 B U R U K ? A L A Data Not Found A L A 3. RESULTS AND ANALYSIS Data used in the form of a vocabulary that will be translated into the Javanese language derived from the existing Javanese dictionary. In the research that is being done this observation is done in the form of direct observation of the use of Javanese language in the community that began to be shifted based on a journal or article that writes directly about the alignment The use of Javanese language among the younger generation and several journals that proves some matching string algorithms that can be used for comparison. Figure 2 explains the test results of the three algorithms. Based on the results of testing of 1500 vocabularies with 400 experiments, the accuracy of the Horspool algorithm is lower than the KMP and Boyer-Moor algorithms, with an accuracy rate of 85.3%, while the KMP and Boyer-Moor algorithms are 100% respectively. Mathematically the test results are explained as follows: Accuracy level = (Number of successful samples/total number of samples) x 100% Accuracy of Boyer-Moore = ( 400 400 ) 𝑥100%= 100% Accuracy of Akurasi KMP = ( 400 400 ) 𝑥100% = 100% Accuracy of Akurasi Horspool = ( 341 400 ) 𝑥100% = 85.3%
  • 5. TELKOMNIKA Telecommun Comput El Control  Comparison of search algorithms in Javanese-Indonesian dictionary application (Yana Aditia Gerhana) 2521 Figure 3 explains the results of testing the time of the third algorithm search process. The speed of the algorithm is tested based on the processing time in searching vocabulary. Based on the test results, the algorithm that has the fastest speed is Knuth-Morris-Pratt with an average of 25 ms, Horspool 39.9 ms, and Boyer Moore 44.2 ms. Figure 4 explains in detail the comparison graph of the speed of each algorithm in searching each Javanese vocabulary into Indonesian where blue indicates Boyer Moore's algorithm, red indicates Knuth Morris Pratt's algorithm, and green indicates Horspool's algorithm. Figure 2. Accuracy algorithm Figure 3. Average value of comparison algorithm at match speed level Figure 4. Time execution algorithm Testing algorithms based on the complexity of the algorithm, testing is conducted based on the efficiency of how much space (space) and the time it takes for the algorithm to run every step by step in the algorithm. After testing the three algorithms, obtained the result that Boyer Moore's algorithm has an overall n total of 11n, with the amount of n2 as much as 26n2 . The algorithm of Knuth Morris Pratt algorithm has an overall n of 8n and an amount of n2 as much as 20n2 , and the Horspool algorithm has a value of n as much as 10n and value of n2 as much as 20n2 . Figure 5 explains that Knuth Morris Pratt's algorithm has
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524 2522 the best time efficiency with a sum value of N2 and the least n values compared to the Horspool algorithm and Boyer Moore's algorithm, which means the time the algorithm process is Has the most rapid processing efficiency rates compared to another algorithm. Figure 5. Comparison of algorithm complexity testing 4. CONCLUSION Based on the test results, Boyer-Moor and KMP have a higher level of accuracy compared to the Horspool algorithm. While the average processing time of KMP is better than Horspool and Boyer-Moor. The processing time is directly proportional to the efficiency produced by KMP, which is better than the Boyer-Moor and Horspool algorithm, with the least number of n2 and n values. REFERENCES [1] M. Abdullahi, M. A. Ngadi, S. I. Dishing, S. M. Abdulhamid, and B. I. eel Ahmad, “An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment,” J. Netw. Comput. Appl., vol. 133, pp. 60-74, 2019. [2] G. Li, H. Zhou, X. Jing, G. Tian, and L. Li, “An intelligent wheel position searching algorithm for cutting tool grooves with diverse machining precision requirements,” Int. J. Mach. Tools Manuf., vol. 122, pp. 149-160, 2017. [3] M. S. Sanaj and P. M. Joe Prathap, “Nature inspired chaotic squirrel search algorithm (CSSA) for multi objective task scheduling in an IAAS cloud computing atmosphere,” Eng. Sci. Technol. an Int. J., 2019. [4] J. Brandão, “A memory-based iterated local search algorithm for the multi-depot open vehicle routing problem,” Eur. J. Oper. Res., vol. 284, no. 2, pp. 559-571, 2020. [5] S. Makhdoomi and A. Askarzadeh, “Optimizing operation of a photovoltaic/diesel generator hybrid energy system with pumped hydro storage by a modified crow search algorithm,” J. Energy Storage, vol. 27, 2020. [6] M. Yarlagadda, K. Gangadhara Rao, and A. Srikrishna, “Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering,” J. King Saud Univ. -Comput. Inf. Sci., 2019. [7] P. H. Xiao, B. W. Li, and S. B. Wang, “A coupled DEM-FTSM approach with a new cost-effective searching algorithm of particles for gas-solid flow with heat transfer,” Int. J. Therm. Sci., vol. 143, pp. 52-3, 2019. [8] E. H. Mohamed and E. M. Shokry, “QSST: A Quranic Semantic Search Tool based on word embedding,” J. King Saud Univ.–Comput. Inf. Sci., 2020. [9] S. T. Klein and D. Shapira, “The String-to-Dictionary Matching Problem," Proceedings of the Data Compression Conference, vol. 55, no. 11, pp. 143-152, 2015. [10] S. Das and K. Kapoor, “Weighted approximate parameterized string matching,” AKCE Int. J. Graphs Comb., vol. 14, no. 1, pp. 1-12, 2017. [11] G. Didier and L. Tichit, “Designing optimal- and fast-on-average pattern matching algorithms,” arXiv:1604.08860v4, 2016. [12] C. Ryu and K. Park, “Improved pattern-scan-order algorithms for string matching,” J. Discret. Algorithms, 2018. [13] M. Xu, X. Jia, M. Pickering, and A. J. Plaza, “Cloud removal based on sparse representation via multitemporal dictionary learning,” IEEE Trans. Geosci. Remote Sens., vol. 54, no. 5, pp. 2998–3006, 2016. [14] M. Bhagya Sri, R. Bhavsar, and P. Narooka, “String Matching Algorithms,” Int. J. Eng. Comput. Sci., vol. 7, no. 3, pp. 23769-23772, 2018. [15] C. C. Hoong and M. A. Ameedeen, “Boyer-moore horspool algorithm used in content management system of data fast searching,” Adv. Sci. Lett., vol. 23, no. 11, pp. 11387-90, 2017. [16] D. Gurung, U. K. Chakraborty, and P. Sharma, “Intelligent Predictive String Search Algorithm,” Procedia Computer Science, vol. 79, pp. 161-169, 2016. [17] W. R. King, “Knowledge Management and Organizational Learning,” Annals of Information Systems 4, pp. 3-13, 2009. [18] M. Morales, S. Scherer, and R. Levitan, “A Cross-modal Review of Indicators for Depression Detection Systems,” Proceedings of the Fourth Workshop on Computational Linguistics and Clinical Psychology-From Linguistic Signal to Clinical Reality, 2017.
  • 7. TELKOMNIKA Telecommun Comput El Control  Comparison of search algorithms in Javanese-Indonesian dictionary application (Yana Aditia Gerhana) 2523 [19] A. Kusnadi and A. K. Wicaksono, “Comparison of Horspool Algorithm and Zhu-Takaoka Algorithm in Desktop-Based String Search,” J. Ultim. Comput., vol. 9, no. 1, pp. 12-16, 2017. [20] W. Astuti, “Analysis of String Matching in These Title Using Knuth-Morris-Pratt (KMP) Algorithm,” Ilk. J. Ilm., vol. 9, no. 2, pp. 167-172, 2017. [21] S. Vijayarani, M. J. Ilamathi, M. Nithya, A. Professor, and M. P. Research Scholar, “Preprocessing Techniques for Text Mining -An Overview,” Int. J. Comput. Sci. Commun. Networks, vol. 5, no. 1, pp. 7-16, 2015. [22] M. Bhagya Sri, R. Bhavsar, and P. Narooka, “String Matching Algorithms,” Int. J. Eng. Comput. Sci., pp. 23769-23772, 2018. [23] C. Slamet, A. R. Atmadja, D. S. Maylawati, R. S. Lestari, W. Darmalaksana, and M. A. Ramdhani, “Automated Text Summarization for Indonesian Article Using Vector Space Model,” IOP Conference Series: Materials Science and Engineering, 2018. [24] R. Y. Tsarev, A. S. Chernigovskiy, E. A. Tsareva, V. V. Brezitskaya, A. Y. Nikiforov, and N. A. Smirnov, “Combined string searching algorithm based on knuth-morris-pratt and boyer-moore algorithms,” IOP Conference Series: Materials Science and Engineering, 2016. [25] R. Fitriyanto, A. Yudhana, and S. Sunardi, “Implementation SHA512 Hash Function and Boyer-Moore String Matching Algorithm for Jpeg/exif Message Digest Compilation,” J. Online Inform., vol. 4, no. 1, pp. 16-23, 2019. [26] F. T. Waruwu and R. Mandala, “Comparison of Knuth Morris Pratt and Boyer Moore Algorithms in Matching Strings in Nias Language Dictionary Application,” J. Ilm. INFOTEK, vol. 1, no. 1, 2016. [27] rachmad fitriyanto, A. Yudhana, and S. Sunardi, “Implementation SHA512 Hash Function and Boyer-Moore String Matching Algorithm for Jpeg/exif Message Digest Compilation,” J. Online Inform., vol. 4, no. 1, pp. 16-23, 2019. [28] J. Bhandari and A. Kumar, “String Matching Rules Used by Variants of Boter-Moore,” J. Glob. Res. Comput. Sci., vol. 5, no. 1, pp. 8-11, 2014. [29] R. F. Rahmat, D. F. Prayoga, D. Gunawan, and O. S. Sitompul, “Boyer-Moore Algorithm in Retrieving Deleted Short Message Service in Android Platform,” IOP Conf. Ser. Mater. Sci. Eng., vol. 308, no. 1, 2018. [30] L. S. Riza, M. I. Firmansyah, H. Siregar, D. Budiana, and A. Rosales-Pérez, “Determining strategies on playing badminton using the Knuth-Morris-Pratt algorithm,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 6, pp. 2763-2770, 2018. [31] R. A. Baeza-Yates and M. Régnier, “Average running time of the Boyer-Moore-Horspool algorithm,” Theor. Comput. Sci., vol. 92, no. 1, pp. 19-31, 1992. [32] L. Jun, Z. Zhuo, M. Juan, and L. Xingfeng, “Multi-pattern Matching Methods Based on Numerical Computation,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 11, no. 3, pp. 1497-1505, 2013. [33] A. Kusnadi and A. K. Wicaksono, “Comparison of the Horspool Algorithm and the Zhu-Takaoka Algorithm in Desktop-Based String Search (in Bahasa: Perbandingan Algoritma Horspool dan Algoritma Zhu-Takaoka dalam Pencarian String Berbasis Desktop),” J. Ultim. Comput., vol. 9, no. 1, pp. 12-16, 2017. BIOGRAPHIES OF AUTHORS Yana Aditia Gerhana is a lecturer from Informatic Engineering Faculty of Science and Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized in artificial intelligence information sistem and software engineering. Nur Lukman is a lecturer from Informatic Engineering Faculty of Science and Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized in Information System and Computer Science.
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2517 - 2524 2524 Arief Fatchul Huda is a lecturer from Mathematics Faculty of Science and Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized in Image Processing and Spatio Temporal Analysis. Cecep Nurul Alam is a lecturer from Informatic Engineering Faculty of Science and Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized Information System and Computer Science. Undang Syaripudin is a lecturer from Informatic Engineering Faculty of Science and Technology UIN Sunan Gunung Djati Bandung in Indonesia, specialized Information System and Computer Science. Devi Novitasari is a Bachelor of Engineering of Sunan Gunung Djati State Islamic University In 2018. After her bachelor degree, she gained considerable experience. Currently, she work in company property in bandung as digital marketing and data administration.