Search Results - (( developing filing search algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing filing »
- implication based »
- java implication »
- search »
-
1
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
Get full text
Get full text
Thesis -
2
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…We proposed two novel search algorithms named QuickFlood and HybridFlood. …”
Get full text
Get full text
Thesis -
3
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
4
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The motive is to search for a set of semantically similar GO terms from the fragmented GO RDF/XML files to a given query. …”
Get full text
Get full text
Monograph -
5
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
6
A web-based library search engine using conflation method / Zulfahanan Abdul Gani
Published 2010“…Second, to design and develop library search engine for students using Conflation Method. …”
Get full text
Get full text
Thesis -
7
T-way testing : a test case generator based on melody search algorithm
Published 2015“…This thesis is research on developing a T-Way Testing : A Test Case Generator Based On Melody Search Algorithm (TTT-MS) to generate optimum final test list. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…Data is collected from 4 most popular web browsers, Google Chrome, Mozilla Firefox, Microsoft Edge, and Opera in the Windows 11 environment in the context of evidence collection, emphasizing the significance of 35 data types such as history visits, history search, search keyword, cookies, cache, file, session, bookmarks, downloaded files and many more in digital forensic investigations. …”
Get full text
Get full text
Get full text
Article -
9
Indexing system for spoken document / Aishul Aman Sulaiman Bukhari
Published 2011“…The use of an algorithm of naming convention will be developed to create an indexing name for each document to make an ease in searching the requested information. …”
Get full text
Get full text
Thesis -
10
-
11
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…To be able to retrieve all possible signals involved within a suspected boundary is a popular search computational problem. Therefore the path extractor program proposed incorporates the characteristics of a depth-first search algorithm by considering the specifications of a cell-based design. …”
Get full text
Get full text
Thesis -
12
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…On extracting the desired features, a new automation of feature extraction using Depth First Search (DFS) with sequential search are introduced and succeed to extract the targeted features with consideration of no limitation on application file size also no limitation on file number. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Rational drug design using genetic algorithm: case of malaria disease
Published 2012“…Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. …”
Get full text
Get full text
Get full text
Article -
16
Prevention of Textual Plagiarism Application
Published 2011“…This form of plagiarism can be categorized as a form of direct stealing without proper acknowledgment and consent of another's work. Rabin - Karp Algorithm which is a string searching algorithm that uses hashing to compare the strings will be integrated in this project as well. …”
Get full text
Get full text
Final Year Project -
17
-
18
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
19
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The enhanced harmony search (EHS) algorithm is employed to tune hyperparameters and increase model performance while mitigating overfitting in the EPDL model. …”
thesis::doctoral thesis -
20
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…Web browsing history, keyword searches, cookies, cache, bookmarks, downloaded files, login id, password, email, and social media are all examples of evidence data types that can help with a digital forensic investigation. …”
Get full text
Get full text
Article
