Search Results - (( developing filing implementation algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implementation algorithm »
- filing implementation »
- developing filing »
- implication based »
- java implication »
-
1
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
4
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
Get full text
Get full text
Get full text
Article -
5
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
Get full text
Get full text
Thesis -
6
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…Thus, another algorithm should be implemented to keep the existence of a message secret. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Automatic assessment for engineering drawing
Published 2013“…This method is tedious as algorithms need to be developed for each shape to be assessed. …”
Get full text
Get full text
Article -
10
-
11
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
12
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…Semantic web aims to improve current web retrieval ability by implementing ontology. Ontology can be developed using manually and automatically ontology development. …”
Get full text
Get full text
Thesis -
13
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…Two prototypes are developed which implement CGTree-MCCTreeGenerator and XMCCTreeGenerator. …”
Get full text
Get full text
Thesis -
14
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
15
A network based fetal ECG monitoring algorithm
Published 2011“…The networking program is developed by a client/server approach and it can transport the AECG data file as well as online chatting facility. …”
Get full text
Get full text
Get full text
Article -
16
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
Get full text
Get full text
Get full text
Book Section -
17
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
19
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
20
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis
