Search Results - parallel filing system

Refine Results
  1. 1

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The prime focus is on file locking techniques, state maintenance of file locks and layouts, data compression and data protection across network attached storage and parallel network file system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques by Islam, Md. Rafiqul, Naji, Ahmed Wathik, Zaidan , A. A., Zaidan , B. B.

    Published 2009
    “…Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Interfacing analog to digital converter by Chee, Fuei Pien

    Published 2008
    “…The voltage and corresponding wind velocity are recorded in an excel file. The data are recorded at every single second as well as the system is operated to optimize the accuracy. …”
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Parallelization of speech compression based algorithm based on human auditory system on multicore system by Gunawan, Teddy Surya, Kartiwi, Mira, Khalifa, Othman Omran

    Published 2012
    “…The objective of this research is to develop and implement a novel parallel speech compression algorithm based on human auditory system on a multicore system. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…Results show that the developed parallel SQLite system has reduced the overhead of database encryption from 30.8%, with serial implementation, up to 17.8% when parallel SQLite is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    “Stego-analysis chain, session two” novel approach of stego-analysis system for image file by Naji, Ahmed Wathik, Hameed, Shihab A., Islam, Md. Rafiqul, Zaidan, B .B., Gunawan, Teddy Surya, Zaidan, A.A.

    Published 2009
    “…Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have too many investigations on the stego analysis systems, this paper will focus on the image file, the earlier tests showing that we may use the histogram habits to classify the image in to image carried data hidden and original image, the study will focus in to two main idea, the first idea, on the colour image, the colour start become grouping parallel with the increasing of the data hidden and the second feature on the gray level image, the histogram in the original image was pure without colours, after the embedding method has been applied there are many colour start to appears as shown down in the histogram, we will try through this paper to offer a new stego-analysis system though study the habits of the histogram.…”
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14
  15. 15

    Embedded devices security: design and implementation of a light RDBMS encryption utilizing multi-core processors by Alomari, Mohammad Ahmed, Aris, Hazleen, Ghaleb, Mukhtar, Almurtadha, Yahya, Alkawsi, Gamal Abdulnaser, Al-Hadi, Ismail Ahmad Al-Qasem, Baashar, Yahia, Samsudin, Khairulmizam

    Published 2023
    “…If an attacker can gain access to higher system privileges or find a way to access the database plain file, he can tamper with the database files and user-sensitive data, which breaches the security CIA triad of SQLite. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Kawalan mikrokomputer ke atas motor pelangkah dan simulasinya by Mahamod Ismail, Ismail,Mohd. Alauddin Mohd. Ali, Kam , Teik Boon

    Published 1991
    “…SMOC system (Stepper Motor Controller) has been designed to control a stepper motor using a microcomputer. 7he system consists of Automatic Control Mode, Position Control Mode, Keyboard Control Mode, Timer Control Mode and other facilities like DOS System, Help Menu and Data Files. 7his package is menu oriented and developed using Turbo basic languagefor IBM PCIA Tcomputer. …”
    Get full text
    Get full text
    Article
  18. 18

    Design and implementation of electronic control system for UTM-AUV by Saat, Ezril Hisham Mat, Mamat, Rosbi, Yaakob, Omar

    Published 2000
    “…The generic real time has been selected as system target file to provide real time simulation environment. …”
    Get full text
    Get full text
    Article
  19. 19

    Embedded Devices Security: Design and Implementation of a Light RDBMS Encryption Utilizing Multi-Core Processors by Alomari M.A., Aris H., Ghaleb M., Almurtadha Y., Alkawsi G.A., Al-Hadi I.A.A.-Q., Baashar Y., Samsudin K.

    Published 2024
    “…If an attacker can gain access to higher system privileges or find a way to access the database plain file, he can tamper with the database files and user-sensitive data, which breaches the security CIA triad of SQLite. …”
    Article
  20. 20

    DSC650: Data Technology and Future Emergence / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2018
    “…In particular, the students will examine the map-reduce parallel computing paradigm and associated technologies such as Hadoop distributed file systems, and no sql databases.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource