Search Results - (( developing filing system algorithm ) OR ( java applications testing algorithm ))

Refine Results
  1. 1

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm by Asnawi, Rustam, Wan Ahmad, Wan Fatimah, A. Rambli, Dayang R.

    Published 2010
    “…By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13
  14. 14

    Automated Malicious File Investigation by RAMA ROA, SHARVITA

    Published 2020
    “…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    A network based fetal ECG monitoring algorithm by Ibrahimy, Muhammad Ibn, Hasan , M. A., Motakabber, S. M. A.

    Published 2011
    “…Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
    Get full text
    Get full text
    Get full text
    Article