Search Results - (( developing filing _ algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The obtained results show the developed prototype was able to encrypt and decrypt the file correctly without making any errors. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm by Asnawi, Rustam, Wan Ahmad, Wan Fatimah, A. Rambli, Dayang R.

    Published 2010
    “…By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…This paper presents the development of software that automatically generates a description file of a UDA to be deployed for memory BIST circuit implementation using Tessent memory BIST software. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Statistical fixed range multiple selection algorithm for peer-to-peer system by Kweh, Yeah Lun, Othman, Mohamed, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2010
    “…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged in ascending order in the local file. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Static range multiple selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2011
    “…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged according to certain order in the file. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Development of Digital Image Processing Algorithms via FPGA Implementation by Shamsiah, Suhaili, Joyce, Huong Shing Yii, Asrani, Lit, Kuryati, Kipli, Maimun, Huja Husin, Mohamad Faizrizwan, Mohd Sabri, Norhuzaimin, Julai

    Published 2024
    “…Several digital image processing algorithms have been developed in this project, which are gray level transformation, brightness manipulation, contrast adjustment, thresholding, and inversion. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Detecting JFIF header using FORHEADER by Kamaruddin Malik, Mohamad, Herawan, Tutut, Mustafa, Mat Deris

    Published 2011
    “…Even though there are few applications developed for file carving that rely on header and footer e.g. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    On the Identification of FOSD-based Non-zero Onset Speech Dataset by Tran, D.C., Ibrahim, R.

    Published 2020
    “…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    SUMO enhancement for vehicular ad hoc network (VANET) simulation by Lim, Kit Guan, Lee, Chun Hoe, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2017
    “…SUMO is proved to be a good simulation tool for VANET while MATLAB is good for future algorithm development. To develop a good simulation platform, modification on SUMO files are necessary. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings