Search Results - (( basic filing system algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- system algorithm »
- filing system »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Concealment of files blocked by Gmail with EOF-based image steganography
Published 2018“…Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…There were two type of dataset which is video and document files with four different sizes. The time taken of the hashing algorithm generate the hash value were recorded. …”
Get full text
Get full text
Thesis -
4
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware part is developed for abdominal Electrocardiography (AECG) data acquisition system. Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
Get full text
Get full text
Get full text
Article -
5
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
6
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
7
-
8
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…The heterogeneity of peers in unstructured P2Ps introduces both challenges and opportunities when designing a P2P network. Flooding is a basic file search procedure in unstructured P2P file-sharing systems. …”
Get full text
Get full text
Thesis -
9
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
11
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
12
A secure message handler using microsoft cryptoapi
Published 2003“…These routines were compiled together to form the Dynamic Link Library (DLL) file. This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A secure message handler using microsoft cryptoapi
Published 2003“…These routines were compiled together to form the Dynamic Link Library (DLL) file. This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks
Published 2014“…Flooding search is a basic search scheme for unstructured peer-to-peer networks, where a node must send a query message to all its neighbors when seeking a file (in a file sharing situation). …”
Get full text
Get full text
Get full text
Article -
15
-
16
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…An algorithm was used to verify filetypes by looking up a File Signature library to compare files’ header with their extension. …”
Get full text
Get full text
Thesis -
17
Real-time algorithmic music composition application.
Published 2022“…The motivation of this project is to provide a solution to problems including the high cost and time consumption for composing music, the complexity of music composition, and the limitations of using copyrighted music. The developed system shall be able generated music based on a genetic algorithm, where users can define basic parameters including the instrument used to play the music, tempo, number of generated notes, and the number of measures to generate. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With the same compression properties, this encryption algorithm was shown to be able to produce average file size smaller than baseline JPEG and other encryption. …”
Get full text
Get full text
Thesis -
19
T-way testing : a test case generator based on melody search algorithm
Published 2015“…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis
