Search Results - (( developing file using algorithm ) OR ( java application means algorithm ))
Search alternatives:
- application means »
- java application »
- developing file »
- using algorithm »
- means algorithm »
- file using »
-
1
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
Get full text
Get full text
Thesis -
2
A Comparative Study on Compression of Different Image File Formats
Published 1999“…Some of the experiment was done twice with two different types of images to ensure that the results were accurate. The Algorithms used to compress and decompress the image ware Run Length Encoding (RLE) algorithm and Lampel-ziv and Welch (LZW) algorithm. …”
Get full text
Get full text
Thesis -
3
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The obtained results show the developed prototype was able to encrypt and decrypt the file correctly without making any errors. …”
Get full text
Get full text
Undergraduates Project Papers -
6
-
7
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…human’s life sectors. People use many file types of each multimedia element such as file type of videos, audios, images,graphs, animations, texts and also live video streaming. …”
Get full text
Get full text
Conference or Workshop Item -
8
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
9
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
11
-
12
-
13
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
14
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…They are the most popular algorithms used in digital image processing. Microsoft Paint is used to convert the format of the color input image to bitmap format, followed by MATLAB to convert it into a hexadecimal file to be read and written in FPGA. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Detecting JFIF header using FORHEADER
Published 2011“…Foremost, Scalpel; however the algorithm used for header detection is not much discussed. …”
Get full text
Get full text
Get full text
Article -
16
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
17
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…The algorithm uses a fixed filter range approach that has been defined before the process begin, in which the algorithm is able to make sure that the target key is within the specified filter range in each local file. …”
Get full text
Get full text
Conference or Workshop Item -
18
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The algorithm uses a fixed filter approach in which the algorithm is able to make sure that the target key is within certain filter range in each local file. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020“…In order to develop such TTS or STT engines, text and the corresponding recorded speech in an audio file used for training, validating and testing must be aligned. …”
Get full text
Get full text
Conference or Workshop Item -
20
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis
