Search Results - (( developing filing prevention algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Prevention of Textual Plagiarism Application by Mohd Nor, Nor Atikah

    Published 2011
    “…This project is mainly about detecting and preventing plagiarism among UTP students. In order to achieve this, a system which named as Prevention of Textual Plagiarism Application will be developed which provides the capability to detect similarities between documents submitted by students. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    SUMO enhancement for vehicular ad hoc network (VANET) simulation by Lim, Kit Guan, Lee, Chun Hoe, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2017
    “…SUMO is proved to be a good simulation tool for VANET while MATLAB is good for future algorithm development. To develop a good simulation platform, modification on SUMO files are necessary. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  3. 3

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…The email system used to send the encrypted file to the third party. During the development of COS, the specific methodology used which is Prototyping Process. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…Compared with SCBEH without implementing this protocol, the time cost of client users is further reduced on average by 15.8% on generating 10M files, while the time cost of accessing 10M files is significantly reduced by about 10%-79.8%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…When a fall event occurs, the real-time data is collected and placed in a *.CSV file. Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. This is achieved by trying to combine several techniques of securing and strengthening the RSA algorithm. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell by Tompell, Aviefieorennia

    Published 2016
    “…The project overall objectives are achieved and it is successfully applied on .pdf and .doc file format of the final examination question paper. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques by Jifroudi, Hamidreza Maskani

    Published 2021
    “…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time face mask detection using YOLOv4 by Tey, Chen Hup

    Published 2022
    “…This application will apply an object tracking algorithm when performing face mask detection in real-time to prevent the detections on the same object from being stored into the database repeatedly in every single frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis