Search Results - (( java implementation phase algorithm ) OR ( filing values using algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- using algorithm »
- filing values »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…To eliminated the duplicate data, the file unique value or hash value need to compare and the files that have the same hash value will be remove. …”
Get full text
Get full text
Thesis -
3
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses machine learning method to detect anomalies in system log files. …”
Get full text
Get full text
Get full text
Thesis -
4
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…First experiment uses the original set of data collections. In second experiment, new words are added in the dictionary and the total value for i ' , 'm', 'p', 'q', 'y' and 'z' are modified in the header file "dcvarnew.h". …”
Get full text
Get full text
Thesis -
5
On randomness of compressed data using non-parametric randomness tests
Published 2018“…Four randomness tests were used to test the outputs (compressed files) of four lossless compressions algorithms: JPEG-LS and JPEG-2000 algorithms are image-dedicated algorithms, while 7z and Bzip2 algorithms are generalpurpose algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
7
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…In fifth experiment, the total value for 'a' dictionary in header file "dcvarnew.h" is modifying. …”
Get full text
Get full text
Thesis -
8
-
9
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The selfscalable selection algorithm uses dynamic range where the filter range is not preset and is determined by the algorithm itself based on the distribution and the values of the data in the global and local file. …”
Get full text
Get full text
Thesis -
12
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
13
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
14
An efficient method for audio watermarking using SWT and mean value quantization
Published 2016“…Digital watermarking has been capturing the interests in programming society several decades ago due to the development of software and programming techniques that cause an increase in illegal use of digital files. In addition, with the widespread use of Internet which support sharing any digital files easily, this had simplified distribution of illegal digital files without the owner’s permission. …”
Get full text
Get full text
Thesis -
15
Secure lightweight client for cloud-based E-Health Model
Published 2023“…According to the calculated results, the confidence interval of NSSA values on accessing the 10M file is 0.17~0.23. The error between the calculated NSSP values and the measured NSSA values does not exceed 5%. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
Get full text
Get full text
Get full text
Thesis -
18
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
Published 2019“…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
Get full text
Get full text
Student Project -
19
-
20
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. …”
Get full text
Get full text
Article
