Search Results - (( developing comparing document algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- developing comparing »
- implementation level »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Enhancing latent semantic analysis (LSA) using tagging algorithm in retrieving Malay documents / Afiqah Bazlla Md Soom
Published 2018“…Latent Semantic Analysis (LSA) algorithm is a mathematical approach that uses Singular Value Decomposition (SVD) to discover the important association of the relationship between terms and terms, terms and documents and also documents and documents. …”
Get full text
Get full text
Thesis -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
10
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…Stemming algorithm have been developed in many different languages. …”
Get full text
Get full text
Thesis -
11
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…Text search engine prototype using signature file can speed up the process of searching and retrieving information from Malaysian text documents. The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
Get full text
Get full text
Thesis -
12
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…This research combines the ontology and text representation for classification by developing five algorithms. The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman
Published 2012“…After testing the developed jigsaw puzzle by comparing the result with automatic jigsaw puzzle solver using Backtracking algorithm, it shows that Backtracking algorithm are not suitable algorithm to be used to develop the interactive jigsaw puzzle because it takes longer time in solving the game as compared to Backtracking algorithm that used in automatic jigsaw puzzle solver that was found in previous research.…”
Get full text
Get full text
Thesis -
15
Stemming and lemmatization: A comparison of retrieval performances
Published 2014“…Comparisons were also made between these two techniques with a baseline ranking algorithm (i.e. with no language processing). A search engine was developed and the algorithms were tested based on a test collection. …”
Get full text
Get full text
Conference or Workshop Item -
16
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…The effectiveness of ABBA-AMCL was compared to 8 FS methods based on meta-heuristic algorithms and 6 graph-based ED methods. …”
Get full text
Get full text
Thesis -
17
Rule-based filtering algorithm for textual document
Published 2017“…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
Get full text
Get full text
Get full text
Article -
18
A category classification algorithm for Indonesian and Malay news documents
Published 2016“…Hence, the aim of this study is to develop an integrated generic TC algorithm which is able to identify the language and then classify the category for identified news documents. …”
Get full text
Get full text
Article -
19
An intelligent categorization tool for malay research articles
Published 2015“…Hence, by increasing the mapping percentage for the bilingual clusters, a more robust clustering algorithm can be developed for clustering bilingual documents. …”
Get full text
Get full text
Research Report -
20
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…A large number of documents are now represented and stored using an XML document structure on the web. …”
Get full text
Get full text
Get full text
Thesis
