Search Results - (( java implementation level algorithm ) OR ( knowledge using stemming algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Predicting STEM academic performance in secondary schools: data mining approach by Termedi @Termiji, Mohammad Izzuan, Ab. Jalil, Habibah

    Published 2019
    “…As a result of this insight, it will gives useful insight of explicit and tacit knowledge to students, teachers, parents and minestry in predicting student performance in STEM and to assist teachers in providing effective teaching method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Bahasa Melayu Stemmer / Subbu Valliappan by Subbu , Valliappan

    Published 2004
    “…Unlike other stemmers, this stemmer would not use complex and difficult artificial intelligence techniques such as complicated knowledge representation and major parsing. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism by Surayaini Basri

    Published 2015
    “…The lack of works in building more effective algorithms in performing the stemming process, identifying misspelled words, and identifying neologism has affected the efficiency of retrieving relevant information or articles in Malay language. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
    Get full text
    Get full text
    UMK Etheses
  17. 17

    An intelligent categorization tool for malay research articles by Mohd Norhisham Razali, Rayner Alfred, Chin, Kim On

    Published 2015
    “…In this study, a genetic algorit.hm {GA) is also proposed to be implemented in order to determine the set of terms that can be used in clustering bilingual documents with more effective.…”
    Get full text
    Get full text
    Research Report
  18. 18

    Image and translated Al-Quran verses retrieval system using thesaurus approach based on Malay query words / Mohd Zaini Mat Abas by Mat Abas, Mohd Zaini

    Published 2001
    “…As well as Malay language, conflation methods such as string-similarity method and stemming algorithms have been applied to Malay documents retrieval system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Mathvision prototype using predictive analytics / Yuzi Mahmud ... [et al.] by Mahmud, Yuzi, Abdul Razak, Muhd Syahir, Abdul-Rahman, Shuzlina, Hanafiah, Mastura, Suhaimi, Amien Ashraf

    Published 2023
    “…Flutter framework and Firebase services were used for front-end and back-end system respectively, and Microsoft Power BI was used for data visualization. …”
    Get full text
    Get full text
    Article
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis