Search Results - (( knowledge filing system algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- knowledge filing »
- system algorithm »
- java application »
- filing system »
-
1
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010Get full text
Get full text
Conference or Workshop Item -
2
Static range multiple selection algorithm for peer-to-peer system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Automated Malicious File Investigation
Published 2020“…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
Get full text
Get full text
Final Year Project -
7
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Flooding has no knowledge about network topology nor files or resources distribution, so it ofers an attractive method for file discovery in dynamic and developing networks. …”
Get full text
Get full text
Thesis -
8
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
9
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks
Published 2014“…Flooding search is a basic search scheme for unstructured peer-to-peer networks, where a node must send a query message to all its neighbors when seeking a file (in a file sharing situation). Flooding has no knowledge about network topology and files distribution, thus it offers an attractive method for file discovery in dynamic and evolving networks. …”
Get full text
Get full text
Get full text
Article -
10
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
11
An experiment on the performance of shortest path algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A grid enabled E-theses and dissertations repository system
Published 2002“…Furthermore, multiple file streams can be opened to support larger volume and larger capacity of file operation so that GREET is able to decrease the chances of network congestion caused by input/output file operations. …”
Get full text
Get full text
Get full text
Article -
13
The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
iHOME: an ambient intelligence mobile crowd sensing smart home system
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A new classification model for online predicting users' future movements
Published 2008“…The WUM applies data mining techniques for extracting knowledge from user log files in the particular web server. …”
Get full text
Get full text
Conference or Workshop Item -
17
Clustering Student Performance Data Using k-Means Algorithms
Published 2023“…These data were recorded and stored in many ways, including different filing systems and database formats. By having these data, education institutions have a better way to manage and understand their students. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
19
Design of a reconfigurable computing platform
Published 2023“…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
Conference paper -
20
Automation of Quranic Readings Gathering Process
Published 2021“…In this paper, this process was algorithmically formulated and a developed software system was presented to automate this process. …”
Get full text
Get full text
Get full text
Get full text
Article
