Search Results - (( java application optimized algorithm ) OR ( using file using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…Some of the experiment was done twice with two different types of images to ensure that the results were accurate. The Algorithms used to compress and decompress the image ware Run Length Encoding (RLE) algorithm and Lampel-ziv and Welch (LZW) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Confidentiality based file attributes and data classification using TsF-KNN by Ali, M., Jung, L.T.

    Published 2015
    “…The main objective of this study is to predict the confidential and non-confidential data of a file using K-NN algorithm. We also proposed a method called Training dataset Filtration Key Nearest Neighbour (TsF-KNN) classifier which classifies the data of file based on the confidentiality level of the schema of a file (file attributes). …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13
  14. 14

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The simulation was conducted using File Alyzer, Clone Files Checker and AllDup software. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…Data Grid is an infrastructure that manages huge amount of data files and provides intensive computational resources across geographically distributed systems.To increase resource availability and to ease resource sharing in such environment, there is a need for replication services.This research proposes a replication algorithm, termed as Relationship based Replication (RBR) that integrates users, grid and system perspective.In particular, the RBR includes information of three different relationships in identifying file(s) that requires replication; file-to-user, file-to-file and file-to-grid. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The proposed techniques resulted synchronous LEASE file locking, capturing of state of locks and layouts, Kerberos secured the pNFS locks and layouts on storage, new algorithm enabled the scalable data compression using data block size compression algorithm and better dynamic data protection using RAID.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…The problem of rsync algorithm synchronization process is that rsync tries to check folders and files one by one, which takes long time to synchronize them. …”
    Get full text
    Get full text
    Get full text
    Thesis