Search Results - (( developing commerce encryption algorithm ) OR ( java binary classification algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The main for this techniques which was encryption and decryption were introduced and developed to provide security to these applications. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Research in secure data transfer on network layer has been discussed in detail on the importance to have secure Internet protocol in E-Commerce environment. This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
    Get full text
    Get full text
    Monograph
  5. 5

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. There are many types of scheme used in encrypting a message so that it can be sent to a particular receiver from a particular sender without the third party knowing the content of the message known as cryptosystem. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
    Get full text
    Get full text
    Get full text
    Article