Search Results - (( filing implementation among algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- filing implementation »
- implementation among »
- implication based »
- java implication »
- among algorithm »
-
1
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
Get full text
Get full text
Thesis -
2
Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki
Published 2021“…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
5
-
6
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…Despite the implementation of the mentioned core functionalities of a desktop grid simulator, advanced features such as viewing real-time graphical charts, generating PDF reports of the simulation result and exporting the final result as CSV files has been also included among the other features.…”
Get full text
Get full text
Final Year Project -
7
-
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A grid enabled E-theses and dissertations repository system
Published 2002“…Furthermore, multiple file streams can be opened to support larger volume and larger capacity of file operation so that GREET is able to decrease the chances of network congestion caused by input/output file operations. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Classification of cervical cancer using random forest
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Based on the outcome of the analysis, this research proposed a novel framework namely real-time anomaly detection based on big data technologies (RTADBDT), along with supporting implementation algorithms. The framework comprises of BroIDS, Flume, Kafka, Spark Streaming, Spark MLlib, Matplot and HBase. …”
Get full text
Get full text
Get full text
Thesis -
15
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
Get full text
Get full text
Final Year Project -
16
Perceptions and practices of blended learning in foreign language teaching at USIM
Published 2024journal::journal article -
17
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…The ability to combine practical applications and visualization is among the advantages of technology based training and teaching. …”
Get full text
Get full text
Thesis -
18
Evaluation of XML documents queries based on native XML database
Published 2016“…This study is to evaluate the Native XML database (NXD) performance in a comparison with XML_Enabled Database (XED), and then to ellhance· Entity Relationship (ER) algorithm of the relational schema for the improvement of Insert, Delete, Update and Search XML document (XML files with a large number of elements) and finally, to validate the algorithm in NXD and compare the performance ofXED and NXD, by implementing the same command and control data model. …”
Get full text
Get full text
Thesis -
19
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Although the key generator is distributed among the authority nodes, the decision to generate user credential is based on a single decision. …”
Get full text
Get full text
Thesis -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…That malicious file most probably is a Trojan that capable to steal confidential information from victim’s computer. …”
Get full text
Get full text
Thesis
