Search Results - (( filing implementation among algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…Despite the implementation of the mentioned core functionalities of a desktop grid simulator, advanced features such as viewing real-time graphical charts, generating PDF reports of the simulation result and exporting the final result as CSV files has been also included among the other features.…”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A grid enabled E-theses and dissertations repository system by Por, L.Y., Ong, S.Y., Beh, D., Ismail, M.

    Published 2002
    “…Furthermore, multiple file streams can be opened to support larger volume and larger capacity of file operation so that GREET is able to decrease the chances of network congestion caused by input/output file operations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…Based on the outcome of the analysis, this research proposed a novel framework namely real-time anomaly detection based on big data technologies (RTADBDT), along with supporting implementation algorithms. The framework comprises of BroIDS, Flume, Kafka, Spark Streaming, Spark MLlib, Matplot and HBase. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17

    Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module by Mujber, Tariq Saad

    Published 2001
    “…The ability to combine practical applications and visualization is among the advantages of technology based training and teaching. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation of XML documents queries based on native XML database by Lazim, Raghad Yaseen

    Published 2016
    “…This study is to evaluate the Native XML database (NXD) performance in a comparison with XML_Enabled Database (XED), and then to ellhance· Entity Relationship (ER) algorithm of the relational schema for the improvement of Insert, Delete, Update and Search XML document (XML files with a large number of elements) and finally, to validate the algorithm in NXD and compare the performance ofXED and NXD, by implementing the same command and control data model. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Although the key generator is distributed among the authority nodes, the decision to generate user credential is based on a single decision. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…That malicious file most probably is a Trojan that capable to steal confidential information from victim’s computer. …”
    Get full text
    Get full text
    Thesis