Search Results - (( develop finding encryption algorithm ) OR ( java data selection algorithm ))
Search alternatives:
- selection algorithm »
- develop finding »
- data selection »
- java »
-
1
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
2
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
Get full text
Get full text
Thesis -
3
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
4
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…Similarly, a chosen plaintext attack on Ping et al.’s scheme reveals a reduced key space of 2216.51, down from the claimed 2356, and identifies inefficiencies in its Henon map-based sequential encryption method. These findings emphasize the need for a more comprehensive analysis of encryption schemes that utilize genetic algorithm and sequential encryption techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. …”
Get full text
Get full text
Get full text
Thesis -
6
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
Get full text
Get full text
Get full text
Proceeding -
7
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
Get full text
Get full text
Get full text
Article -
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Then canonical Polyadic decomposition-based attribute reduction is applied to the offload-able task to reduce the data size. Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
9
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
10
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Thesis -
11
An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael
Published 2010“…This overview for advance encryption standard achieving a flexibility and uncomplicated handle with this algorithm, which is a challenge of researchers when be used as implementation. © 2010 Asian Network for Scientific Information.…”
Get full text
Get full text
Article -
12
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
14
Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database
Published 2013“…Sample data was selected for experiments purposes. The result indicates fuzzy multi attribute decision making is a suitable technique in reducing inconsistent data from database. …”
Get full text
Get full text
Article -
15
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
17
Secure block cipher inspired by the human immune system
Published 2012“…Symmetric encryption block cipher is an important cryptographic algorithm and the quest of enhancing data security is crucial due to the heavy usage of internet and mobile devices worldwide. …”
Get full text
Get full text
Thesis -
18
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
20
Driving school student management system
Published 2005“…The ways the company manage their business are too complicated.Worst case comes when there are like a hundred of student to be managed in an hour, while the company Is currently short of workers to find each customer document to be updated.As a result,a system needs to be developed to replace the current system and enhance the company's performance of management.Driving School Student Management System is proposed to handle this job.The system is developed to handle the process of secured login using Rijndael symmetric encryption algorithm,registering new student,searching a student profile and also searching for student progress to be updated using simple linear sequential search algorithm.The expected result from this system is to get the correct output for each function and system is robust and free of error.…”
Get full text
Get full text
Undergraduates Project Papers
