Search Results - (( based encryption search algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9

    An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network by Aitizaz Ali, Mohammed Amin Almaiah, Fahima Hajjej, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Jason Teo, Muhammad Zakarya

    Published 2022
    “…To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Clonal selection algorithm for the cryptanalysis of a simple substitution cipher by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza

    Published 2006
    “…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Iris template protection based on enhanced hill cipher by Khalaf, Emad Taha, Mohammed, Muamer N., Norrozila, Sulaiman

    Published 2016
    “…Biometric is uses to identify authorized person based on specific physiological or behavioral features. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20