Search Results - (( developing filing system algorithm ) OR ( java application model algorithm ))
Search alternatives:
- developing filing »
- application model »
- system algorithm »
- java application »
- model algorithm »
- filing system »
-
1
Real-time algorithmic music composition application.
Published 2022“…Due to time constraints, the development of this system uses a form of RAD development model, namely the phased development model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
A Comparative Study on Compression of Different Image File Formats
Published 1999“…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
Get full text
Get full text
Thesis -
6
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
Get full text
Get full text
Conference or Workshop Item -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
Get full text
Get full text
Thesis -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
10
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
11
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010Get full text
Get full text
Conference or Workshop Item -
12
Static range multiple selection algorithm for peer-to-peer system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
-
17
Automated Malicious File Investigation
Published 2020“…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
Get full text
Get full text
Final Year Project -
18
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
19
-
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article
