Search Results - (( filing implementation phase algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The research involved three phases, algorithm design, implementation, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb, Mushtaq, Mansor, Muhamad, Razali, Ramdan, Daniyal, Hamdan, A. F. Yahaya, Jabbar

    Published 2017
    “…The proposed overall inverter design and the control algorithm are modelled using MATLAB environment (Simulink/m-file Code). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Dynamic simulation of switched-reluctance motor using MATLAB/SIMULINK / Roslan Bakar by Bakar, Roslan

    Published 2003
    “…The performance of a two-phase 4/6 pole SR motor is investigated. The simulation results for a simple current control considered to be reasonable but further work is required to implement control algorithm for accurate speed and torque control.…”
    Get full text
    Get full text
    Thesis
  7. 7

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar

    Published 2010
    “…In an envisaged pre-commercialization phase, the UCE block cipher would be implemented in FPGA chips. …”
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15
  16. 16

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Workload performance evaluation can be implemented during Disaster Management and especially at the response phase to handle large spatial data in the event of an eruption and in this study it is involves the merapi volcano of Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Secret sharing scheme for key management of secure data sharing in cloud by Abd Majid, Noorhafezan

    Published 2019
    “…The test run in localhost by using PHP platform and there are additional components such as the Composer for the implementation of Shamir's Secret Sharing Scheme and the comparison will be recorded based on the two data types, number of users and file size. …”
    Get full text
    Get full text
    Thesis