Search Results - (( filing implementation during algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1

    Improving image denoising methods for PDF image files by Jeevarekha, Gunasegran

    “…Two algorithms are implemented and tested and a new algorithm is proposed for this purpose. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
    Get full text
    Get full text
    Thesis
  5. 5

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…Increasing utilization of Virtual Machines through effective and fair load balancing is then achieved by dynamically selecting a request from a class using Multidimensional Queuing Load Optimization algorithm. A load balancing algorithm is then implemented to avoid underutilization and overutilization of resources, improving latency time for each class of request. …”
    Get full text
    Get full text
    Article
  7. 7

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…The algorithm reads inputs of the ADS-B data file, stores all the required fields for processing either all or a single flight, and finally the ASE will be calculated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…Some existing research works did not considers substantial factors in determining popular files. As a result, the poor popular file selection strategies affect file download and lead to ineffective response time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Chinese character recognition using neural network / Low Poh Tian by Low, Poh Tian

    Published 2003
    “…In this system, each character is captured in a 320*240 pixel, black and white BITMAP file. During image processing a Bitmap file is broken up into a 1OO components, each being a 32*24 pixel in dimension. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…Experiments are performed using the standard Calgary Corpuses, text files (sized up to 1 TB), and audio files to validate the objectives. …”
    Get full text
    Get full text
    Article
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Workload performance evaluation can be implemented during Disaster Management and especially at the response phase to handle large spatial data in the event of an eruption and in this study it is involves the merapi volcano of Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…To achieve the integrity of the scheme, this research proposed a decentralized attribute storage and authority consensus by lowering the Mean Time To Detect (MTTD) and maintaining the new storage count during a security attack. Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
    Get full text
    Get full text
    Thesis