Search Results - (( developing affect encryption algorithm ) OR ( java application tree algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  17. 17