Search Results - (( developing filing system algorithm ) OR ( java application a algorithm ))
Search alternatives:
- developing filing »
- system algorithm »
- java application »
- filing system »
- application a »
- a algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Real-time algorithmic music composition application.
Published 2022“…Due to time constraints, the development of this system uses a form of RAD development model, namely the phased development model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. …”
Get full text
Get full text
Final Year Project -
5
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
6
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
A Comparative Study on Compression of Different Image File Formats
Published 1999“…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
Get full text
Get full text
Thesis -
10
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
Get full text
Get full text
Conference or Workshop Item -
11
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
Get full text
Get full text
Thesis -
12
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
13
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010Get full text
Get full text
Conference or Workshop Item -
14
Static range multiple selection algorithm for peer-to-peer system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
18
-
19
Automated Malicious File Investigation
Published 2020“…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
Get full text
Get full text
Final Year Project -
20
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph
