Search Results - (( ((using processing) OR (data processing)) xml algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…Efforts are made to develop a new tool or method for extracting information from XML data directly without any preprocessing or post processing of the XML documents. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…Given the fact that relational databases are the most widely used technology for managing and storing XML, therefore XML needs to map to relations and this process is one that occurs frequently. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Semantic based mapping from XML to relations by Kamsuriah, Ahmad, Reduan, Samad

    Published 2012
    “…The process of transferring XML to relations is called mapping and these processes occur frequently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The extension component within the indexing structure may also influence the performance of the retrieval process. This research is to develop a prototype for indexing algorithm considering tag weighting for the XML document and also to test the indexer with the existing document. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman by Abd Rahman, Hayati

    Published 2006
    “…The extension component within the indexing structure may also influence the performance of the retrieval process. This research is to develop a prototype for indexing algorithm considering tag weighting for the XML document and also to test the indexer with the existing document. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Development of indexer considering tag weighting for XML document / Masliana Wahid @ Buang by Wahid @ Buang, Masliana

    Published 2005
    “…The extension component within the indexing structure may also influence the performance of the retrieval process. This research is concerns to develop a prototype for indexing algorithm considering tag weighting for the XML document and also to test the indexer with the existing document, hi order to perform efficient retrieval on documents, appropriate index structure or algorithm must be used which include the structural information. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Query languages are largely used to compose structured queries by users to extract data from XML documents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    The development of automated segmentation for the FTMSK official letters in XML / Muhammad Muhaimin Mohd Isa by Mohd Isa, Muhammad Muhaimin

    Published 2005
    “…The main software used is Visual Basic 6.0. The project was estimated by evaluating the similarity of the contents in letter document and the output of XML document. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…With the advent of the Internet, there is a dramatic increase in the volume of semi-structured and unstructured data. Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The development of XML document retrieval using query weighting / Fauziah Mat Saat by Mat Saat, Fauziah

    Published 2005
    “…This research is focus on developing an XML documents retrieval using a query weighting algorithm in order to retrieve FTMSK official letter. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Controlling label size increment of efficient XML encoding and labeling scheme in dynamic XML update by Mirabi, Meghdad, Ibrahim, Hamidah, Mamat, Ali, Udzir, Nur Izura, Fathi, Leila

    Published 2010
    “…Problem statement: In order to facilitate XML query processing, labeling schemes are used to determine the structural relationships between XML nodes. …”
    Get full text
    Get full text
    Article
  17. 17

    Automatic clustering of gene ontology by genetic algorithm by Othman, Razib M., Deris, Safaai, Zakaria, Zalmiyah, Illias, Rosli M., Mohamad, Saberi M.

    Published 2006
    “…Additionally, deciding the number k of clusters to use is not easily perceived and is a hard algorithmic problem. …”
    Get full text
    Get full text
    Article
  18. 18

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  20. 20

    New Countermeasure Approach on XML Digital Signature Against Wrapping Attack by Sawesi, KGA, Azman, NB, Madihah Mohd Saudi

    Published 2024
    “…XML signature wrapping attack poses a great threat to the integrity of web services. …”
    Proceedings Paper