Search Results - (( developing filing system algorithm ) OR ( java extraction method algorithm ))
Search alternatives:
- developing filing »
- extraction method »
- system algorithm »
- method algorithm »
- java extraction »
- filing system »
-
1
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. …”
Get full text
Get full text
Thesis -
2
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. …”
Get full text
Get full text
Research Report -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
5
A Comparative Study on Compression of Different Image File Formats
Published 1999“…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
Get full text
Get full text
Thesis -
6
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
Get full text
Get full text
Conference or Workshop Item -
7
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
9
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
10
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010Get full text
Get full text
Conference or Workshop Item -
11
Static range multiple selection algorithm for peer-to-peer system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
-
14
-
15
Automated Malicious File Investigation
Published 2020“…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
Get full text
Get full text
Final Year Project -
16
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
17
-
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
19
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
20
