Enhancing the performance of search engines based heap based data file and hash based indexing file
نویسندگان
چکیده
منابع مشابه
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Review of ranked-based and unranked-based metrics for determining the effectiveness of search engines
Purpose: Traditionally, there have many metrics for evaluating the search engine, nevertheless various researchers’ proposed new metrics in recent years. Aware of this new metrics is essential to conduct research on evaluation of the search engine field. So, the purpose of this study was to provide an analysis of important and new metrics for evaluating the search engines. Methodology: This is ...
متن کاملAmerican English File Series Evaluation Based on Littlejohn’s Evaluative Framework
Textbooks play a pivotal role in language learning classrooms. The problem is, among a wide range of textbooks available, which one is more appropriate for a specific classroom and a group of learners. In order to evaluate ELT textbooks, theorists and writers have offered different kinds of evaluative frameworks based on a number of principles and criteria. This study evaluates one example of s...
متن کاملAmerican English File Series Evaluation Based on Littlejohn’s Evaluative Framework
Textbooks play a pivotal role in language learning classrooms. The problem is, among a wide range of textbooks available, which one is more appropriate for a specific classroom and a group of learners. In order to evaluate ELT textbooks, theorists and writers have offered different kinds of evaluative frameworks based on a number of principles and criteria. This study evaluates one example of s...
متن کاملHash-Based File Content Identification Using Distributed Systems
A serious problem in digital forensics is handling very large amounts of data. Since forensic investigators often have to analyze several terabytes of data within a single case, efficient and effective tools for automatic data identification or filtering are very important. A commonly used data identification technique is using the cryptographic hash of a file and match it against white and bla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i2.7.10722