Search Results - (( developing filing users algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- developing filing »
- users algorithm »
- filing users »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Secure mobile AES encryptor (SMAE)
Published 2016“…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
Get full text
Get full text
Undergraduates Project Papers -
3
A Comparative Study on Compression of Different Image File Formats
Published 1999“…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
Get full text
Get full text
Thesis -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The obtained results show the developed prototype was able to encrypt and decrypt the file correctly without making any errors. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
7
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
9
CleverSecure ONLINE System
Published 2008“…The system also enables users to attach the encrypted file into their email to send directly to the receiver. …”
Get full text
Get full text
Final Year Project -
10
Trajectory planning and simulation for 3d printing process
Published 2022“…Development of the simulator was started with the development of STL file reader to extract the triangular facets’ vertices from a STL file in ASCII format. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
12
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
13
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…The system is capable of accepting any type of loaded data file and input parameters chosen by the user. The system also provides a user-friendly attributes to be used by unfamiliar MATLAB programming language user.…”
Get full text
Get full text
Research Reports -
14
Real-time algorithmic music composition application.
Published 2022“…Besides generating music, the developed system includes various functionalities including saving the music into an audio file, editing the generated music, playing music, as well as loading and viewing the music previously generated and saved by the users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. …”
Get full text
Get full text
Get full text
Article -
16
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
18
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
19
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
20
SUMO enhancement for vehicular ad hoc network (VANET) simulation
Published 2017“…SUMO is proved to be a good simulation tool for VANET while MATLAB is good for future algorithm development. To develop a good simulation platform, modification on SUMO files are necessary. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
