Search Results - (( java implementation modified algorithm ) OR ( using filing system algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The proposed techniques resulted synchronous LEASE file locking, capturing of state of locks and layouts, Kerberos secured the pNFS locks and layouts on storage, new algorithm enabled the scalable data compression using data block size compression algorithm and better dynamic data protection using RAID.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…These types of agents have different capabilities, actions, and efficiency to the irsync algorithm in file synchronization. The study proposed MAS framework in the Learning Management System (LMS) that involves the transfer of data from one machine to another. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…Data Grid is an infrastructure that manages huge amount of data files and provides intensive computational resources across geographically distributed systems.To increase resource availability and to ease resource sharing in such environment, there is a need for replication services.This research proposes a replication algorithm, termed as Relationship based Replication (RBR) that integrates users, grid and system perspective.In particular, the RBR includes information of three different relationships in identifying file(s) that requires replication; file-to-user, file-to-file and file-to-grid. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses machine learning method to detect anomalies in system log files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…Data replication is a common method used to improve the performance of data access in distributed systems. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm by Asnawi, Rustam, Wan Ahmad, Wan Fatimah, A. Rambli, Dayang R.

    Published 2010
    “…human’s life sectors. People use many file types of each multimedia element such as file type of videos, audios, images,graphs, animations, texts and also live video streaming. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A log file analysis technique using binary-based approach by Fageeri, S.O., Ahmad, R., Baharudin, B.

    Published 2014
    “…Log files are an important by product of any computing systems including database systems. …”
    Get full text
    Get full text
    Article
  16. 16

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The results show that the most time lagging comes from image files, followed by PDF files, and then text files Moreover the encryption and decryption process using the modified system is around twice faster than the old system.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The simulation was conducted using File Alyzer, Clone Files Checker and AllDup software. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis