Search Results - (( knowledge filing system algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Automated Malicious File Investigation by RAMA ROA, SHARVITA

    Published 2020
    “…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Flooding has no knowledge about network topology nor files or resources distribution, so it ofers an attractive method for file discovery in dynamic and developing networks. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks by Barjini, Hassan, Othman, Mohamed, Ibrahim, Hamidah, Udzir, Nur Izura

    Published 2014
    “…Flooding search is a basic search scheme for unstructured peer-to-peer networks, where a node must send a query message to all its neighbors when seeking a file (in a file sharing situation). Flooding has no knowledge about network topology and files distribution, thus it offers an attractive method for file discovery in dynamic and evolving networks. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A grid enabled E-theses and dissertations repository system by Por, L.Y., Ong, S.Y., Beh, D., Ismail, M.

    Published 2002
    “…Furthermore, multiple file streams can be opened to support larger volume and larger capacity of file operation so that GREET is able to decrease the chances of network congestion caused by input/output file operations. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    A new classification model for online predicting users' future movements by Jalali, Mehrdad, Mustapha, Norwati, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2008
    “…The WUM applies data mining techniques for extracting knowledge from user log files in the particular web server. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Clustering Student Performance Data Using k-Means Algorithms by Sultan Alalawi, Sultan Juma, Mohd Shaharanee, Izwan Nizal, Mohd Jamil, Jastini

    Published 2023
    “…These data were recorded and stored in many ways, including different filing systems and database formats. By having these data, education institutions have a better way to manage and understand their students. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design of a reconfigurable computing platform by Papu J.J., See O.H.

    Published 2023
    “…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
    Conference paper
  20. 20

    Automation of Quranic Readings Gathering Process by AbuSafiya, Majed

    Published 2021
    “…In this paper, this process was algorithmically formulated and a developed software system was presented to automate this process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article