Search Results - (( filing implementation from algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- filing implementation »
- implementation from »
- java implication »
- implication tree »
- from algorithm »
- tree algorithm »
-
1
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
2
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The results show that the most time lagging comes from image files, followed by PDF files, and then text files Moreover the encryption and decryption process using the modified system is around twice faster than the old system.…”
Get full text
Get full text
Thesis -
3
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
Get full text
Get full text
Thesis -
4
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
Get full text
Get full text
Thesis -
5
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
Get full text
Get full text
Get full text
Article -
6
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
7
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis -
8
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Article -
9
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Get full text
Get full text
Article -
12
Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki
Published 2021“…Therefore, this project aims to help the company to classify and visualize the sentiments of the reviews by collecting the reviews from Twitter or uploading a file containing reviews to the system. …”
Get full text
Get full text
Thesis -
13
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…Keywords are manually randomly selected from the files and executed between three to five numbers of keyword. …”
Get full text
Get full text
Thesis -
15
Protection of integrity and ownership of pdf documents using invisible signature
Published 2012“…Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver’s side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
18
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
19
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Hence, how to make a more efficient and faster implementation of Rivest Shamir Adleman algorithm (RSA) is a great concern to researchers in the field of cryptography. …”
Get full text
Get full text
Get full text
Article -
20
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…File carving tools are essential element of digital forensic investigation for recovering evidence data from computer disk drives. …”
Get full text
Get full text
Get full text
Get full text
Thesis
