Search Results - (( affecting implementation encryption algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A secure, anonymous and verifiable E-Voting system by Ooi, Elynn

    Published 2020
    “…Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Multicast-unicast key management scheme in IPv6 networks by Mehdizadeh, Abbas, Hashim, Fazirulhisyam

    Published 2014
    “…Inadequately, this approach increases the number of keys transmitted (communication cost) of the key management. While a number of algorithms has been proposed to address this issue, most of them have severely affected the computation cost (i.e., number of key encryption, decryption, and derivation) of the key management. …”
    Get full text
    Conference or Workshop Item
  8. 8

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  9. 9