Search Results - (( filing implementation from algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The results show that the most time lagging comes from image files, followed by PDF files, and then text files Moreover the encryption and decryption process using the modified system is around twice faster than the old system.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri by Sapri, Nurnadia

    Published 2015
    “…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
    Get full text
    Get full text
    Thesis
  5. 5

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    The performance of the 3DES and Fernet encryption in securing data files by Mohd, Siti Munirah, Kamarudin, Shafinah, Yahya, Norhanizah, Hasan, Sazlinah, Mahamad Zakaria, Muhammad Luqman, Sulaiman, Sahimel Azwal, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    The performance of the 3DES and fernet encryption in securing data files by Siti Munirah, Mohd, Shafinah, Kamarudin, Norhanizah, Yahya, Sazlinah, Hasan, Muhammad Luqman, Mahamad Zakaria, Sahimel Azwal, Sulaiman, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…Therefore, this project aims to help the company to classify and visualize the sentiments of the reviews by collecting the reviews from Twitter or uploading a file containing reviews to the system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The research involved three phases, algorithm design, implementation, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…Keywords are manually randomly selected from the files and executed between three to five numbers of keyword. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Protection of integrity and ownership of pdf documents using invisible signature by Taha, Imad, Zeki, Akram M., Pathan, Al-Sakib Khan, makarim, rusydi

    Published 2012
    “…Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver’s side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…Hence, how to make a more efficient and faster implementation of Rivest Shamir Adleman algorithm (RSA) is a great concern to researchers in the field of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…File carving tools are essential element of digital forensic investigation for recovering evidence data from computer disk drives. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis