Search Results - (( filing implementation some algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- filing implementation »
- implementation some »
- implication based »
- java implication »
- some algorithm »
-
1
Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki
Published 2021“…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
Get full text
Get full text
Thesis -
2
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
3
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
4
Implementing data hiding in still images / lman Hazwam Abd. Halim and Roshidi Din
Published 2004“…Each of these techniques can be applied, with varying degrees of success, to different image files formats. The data hiding process of each method will be discussed in this paper and the comparison tables that. show the suitability of different image file types with the recent data hiding methods according to some parameters also will be provided. …”
Get full text
Get full text
Conference or Workshop Item -
5
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
Get full text
Get full text
Get full text
Book Section -
6
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With the same compression properties, this encryption algorithm was shown to be able to produce average file size smaller than baseline JPEG and other encryption. …”
Get full text
Get full text
Thesis -
7
Towards implementing reactive scheduling for job shop problem
Published 2006Get full text
Get full text
Conference or Workshop Item -
8
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
9
-
10
RISC-V instruction set extension on blockchain application
Published 2024“…In this project, some instructions were proposed to execute the cryptographic algorithm in shorter clock cycles and shorter execution time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
VLSI implementation of huffman design using FPGA with a comprehensive analysis of power restrictions
Published 2015“…However, Huffman coding has some limitations where it depends on the stream of symbols appearing in a file. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A grid enabled E-theses and dissertations repository system
Published 2002“…Some of the universities in Malaysia are still implementing hybrid Electronic Theses and Dissertations (ETD) approach in managing Theses and Dissertations (TD). …”
Get full text
Get full text
Get full text
Article -
18
Architectural review of load balancing single system image
Published 2008“…Result: This study will review some of the most popular architecture and algorithms used in load balancing single system image. …”
Get full text
Get full text
Article -
19
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…The algorithm reads inputs of the ADS-B data file, stores all the required fields for processing either all or a single flight, and finally the ASE will be calculated. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…As a result, the poor popular file selection strategies affect file download and lead to ineffective response time. …”
Get full text
Get full text
Thesis
