Search Results - (( developing filing users algorithm ) OR ( java application based algorithm ))
Search alternatives:
- developing filing »
- application based »
- java application »
- users algorithm »
- filing users »
-
1
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Secure mobile AES encryptor (SMAE)
Published 2016“…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
Get full text
Get full text
Undergraduates Project Papers -
6
A Comparative Study on Compression of Different Image File Formats
Published 1999“…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
Get full text
Get full text
Thesis -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The obtained results show the developed prototype was able to encrypt and decrypt the file correctly without making any errors. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
9
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
11
CleverSecure ONLINE System
Published 2008“…The system also enables users to attach the encrypted file into their email to send directly to the receiver. …”
Get full text
Get full text
Final Year Project -
12
Trajectory planning and simulation for 3d printing process
Published 2022“…Development of the simulator was started with the development of STL file reader to extract the triangular facets’ vertices from a STL file in ASCII format. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
15
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
16
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…The system is capable of accepting any type of loaded data file and input parameters chosen by the user. The system also provides a user-friendly attributes to be used by unfamiliar MATLAB programming language user.…”
Get full text
Get full text
Research Reports -
17
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. …”
Get full text
Get full text
Get full text
Article -
18
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
19
SUMO enhancement for vehicular ad hoc network (VANET) simulation
Published 2017“…SUMO is proved to be a good simulation tool for VANET while MATLAB is good for future algorithm development. To develop a good simulation platform, modification on SUMO files are necessary. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item
