Search Results - (( java implementation graph algorithm ) OR ( using text data algorithm ))

Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analysing the different time taken for both AES and DES , experiment was done by three different file sizes and also file types, such as text, image and voice to test the encryption and decryption time taken on existing algorithm DES and proposed algorithm, in conclusion, all the results of our propose algorithm shows AES takes lesser time compare to DES. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Sentiment classification for malay newspaper using clonal selection algorithm / Nur Fitri Nabila Mohamad Nasir by Mohamad Nasir, Nur Fitri Nabila

    Published 2013
    “…The experimental results show that our method can achieve better performance in clonal selection algorithm sentiment classification and the data collected cannot be used at once in this model because training data is very time-consuming if using all the data. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm. by Isahak, Siti Zulaikha

    Published 2013
    “…How to reduce execution time in searching large amount of data? In this paper, text searching algorithm is using to study the relationship between performance of computer and amount of energy produced in serial and parallel text searching algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The data size of text file used were 50 bytes to 300 bytes. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20