Search Results - (( basic information security algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- basic information »
- java application »
-
1
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…The RIPEMD-160 can improve the security in storing information. This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
-
3
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
4
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…The hash function uses a mathematics conversion to inevitable “encrypt” messages to provide a digital fingerprint. Basically, it is used for message digest. RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
6
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
7
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
13
Stegano-image as a digital signature to improve security authentication system in mobile computing
Published 2016“…Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
15
Recent applications in quantitative methods and information technology
Published 2018“…The analyses in each chapter are explained in detail with samples of real applications in daily life to assist readers to appreciate theoretical, algorithm and mathematical formulations.Prior to reading this book, readers are advised to have some basic foundation in statistical sampling, tabu search approach, neural network, algorithms, and mathematical formulation. …”
Get full text
Get full text
Book -
16
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
19
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. …”
Get full text
Get full text
Thesis
