Search Results - (( using processing xml algorithm ) OR ( java applications security algorithm ))

Refine Results
  1. 1

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…Given the fact that relational databases are the most widely used technology for managing and storing XML, therefore XML needs to map to relations and this process is one that occurs frequently. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    The development of XML document retrieval using query weighting / Fauziah Mat Saat by Mat Saat, Fauziah

    Published 2005
    “…This research is focus on developing an XML documents retrieval using a query weighting algorithm in order to retrieve FTMSK official letter. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman by Abd Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  8. 8

    Controlling label size increment of efficient XML encoding and labeling scheme in dynamic XML update by Mirabi, Meghdad, Ibrahim, Hamidah, Mamat, Ali, Udzir, Nur Izura, Fathi, Leila

    Published 2010
    “…Problem statement: In order to facilitate XML query processing, labeling schemes are used to determine the structural relationships between XML nodes. …”
    Get full text
    Get full text
    Article
  9. 9

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Query languages are largely used to compose structured queries by users to extract data from XML documents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of indexer considering tag weighting for XML document / Masliana Wahid @ Buang by Wahid @ Buang, Masliana

    Published 2005
    “…The extension component within the indexing structure may also influence the performance of the retrieval process. This research is concerns to develop a prototype for indexing algorithm considering tag weighting for the XML document and also to test the indexer with the existing document, hi order to perform efficient retrieval on documents, appropriate index structure or algorithm must be used which include the structural information. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Semantic based mapping from XML to relations by Kamsuriah, Ahmad, Reduan, Samad

    Published 2012
    “…The process of transferring XML to relations is called mapping and these processes occur frequently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    The development of automated segmentation for the FTMSK official letters in XML / Muhammad Muhaimin Mohd Isa by Mohd Isa, Muhammad Muhaimin

    Published 2005
    “…The main software used is Visual Basic 6.0. The project was estimated by evaluating the similarity of the contents in letter document and the output of XML document. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    New Countermeasure Approach on XML Digital Signature Against Wrapping Attack by Sawesi, KGA, Azman, NB, Madihah Mohd Saudi

    Published 2024
    “…XML signature wrapping attack poses a great threat to the integrity of web services. …”
    Proceedings Paper
  19. 19

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…The invention of new algorithms had encouraged to the reinforcement of image processing’s application. …”
    Get full text
    Get full text
    Undergraduates Project Papers