Search Results - (( _ expansion function algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- function algorithm »
- java application »
- application tree »
- tree algorithm »
-
1
-
2
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017“…Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. …”
Get full text
Get full text
Conference or Workshop Item -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
6
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…This transformation function improves the security of the AES algorithm by increasing the randomness of the AES output sequence. …”
Get full text
Get full text
Thesis -
7
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
Get full text
Get full text
Thesis -
8
Modern fuzzy min max neural networks for pattern classification
Published 2019“…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
Get full text
Get full text
Thesis -
9
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Factors contributing to the failure are a mathematical weakness found in the Boolean functions used by these cryptographic hash functions, linear message expansion and poor difusion in the step operation. …”
Get full text
Get full text
Thesis -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
12
Fast sequential learning methods on RBF-network using decomposed training algorithms
Published 2004“…This work investigates novel sequential learning methods applied on a decomposed form of training algorithms using radial basis function (RBF) network. …”
Get full text
Get full text
Conference or Workshop Item -
13
Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail
Published 2014“…In this dissertation, we propose a transformation called Recursive Variable Expansion (RVE), which can be applied to an important category of loops. …”
Get full text
Get full text
Thesis -
14
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
Get full text
Get full text
Article -
15
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
16
The concept of wound healing algorithm
Published 2023“…We emphasise the criteria of lightweight processing and reliability as the main expansions of the algorithm. Finally, we will analyse the model and algorithm in comparison with existing algorithms and provide insights on the performance and capabilities of the proposed models.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Location determination using radio frequency RSSI and deterministic algorithm
Published 2008Get full text
Get full text
Conference or Workshop Item -
18
Penglihatan Foveal (Foveal Vision)
Published 2006“…This is such a healthy expansion and typically can increase the development of other related fields. …”
Get full text
Get full text
Monograph -
19
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
20
Development of a scalable video compression algorithm
Published 2012“…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper
