Search Results - (( _ expansion function algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1
  2. 2

    Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits by Hussien, Hassan Mansour, Muda, Zaiton, Md. Yasin, Sharifah

    Published 2017
    “…Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm by Abdulbari Ali, Sherif

    Published 2005
    “…This transformation function improves the security of the AES algorithm by increasing the randomness of the AES output sequence. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations by Mohd Ali, Fakariah Hani

    Published 2004
    “…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…Factors contributing to the failure are a mathematical weakness found in the Boolean functions used by these cryptographic hash functions, linear message expansion and poor difusion in the step operation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fast sequential learning methods on RBF-network using decomposed training algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2004
    “…This work investigates novel sequential learning methods applied on a decomposed form of training algorithms using radial basis function (RBF) network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…In this dissertation, we propose a transformation called Recursive Variable Expansion (RVE), which can be applied to an important category of loops. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
    Get full text
    Get full text
    Article
  17. 17

    The concept of wound healing algorithm by Jonathan Likoh Juis @ Juise, Teong, Khan Vun, Ryan MacDonnell Andrias, Jetol Bolongkikit, Siti Hasnah Tanalol, Asni Tahir

    Published 2023
    “…We emphasise the criteria of lightweight processing and reliability as the main expansions of the algorithm. Finally, we will analyse the model and algorithm in comparison with existing algorithms and provide insights on the performance and capabilities of the proposed models.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  18. 18

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis