Search Results - (( developing emerging encryption algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2
  3. 3

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Security in robot operating system (ROS) by using Advanced Encryption Standard (AES) by Nor Alia Syuhada, Shaharudin

    Published 2018
    “…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10

    Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review by Wadho, S.A., Yichiet, A., Gan, M.L., Kang, L.C., Akbar, R., Kumar, R.

    Published 2023
    “…Ransomware has emerged as a serious and evolving cybersecurity threat. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Proposed method for enhancing quantum bit error rate using quantum key distribution technique by Abubakar, M.Y., Jung, L.T., Zakaria, N.M., Foong, O.M.

    Published 2014
    “…Therefore this high error rate needs to be reduced for better security using two channels qkd. With the current emergence of quantum computers many security algorithm that could take classical computer years to break could now be broken in matter of seconds. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Framework for location based attendance system by using fourth industrial revolution (4ir) technologies by Ali, Azhar, Koondhar, Muhammad, Depar, Mansoor Hyder, Maher, Zulfikar Ahmed, Rind, Muhammad Malook, Shah, Asadullah

    Published 2021
    “…The designed framework proved to be more secure, all the data in the framework was encrypted with a strong encryption algorithm, final attendance of successful students was stored in the blockchain structure to maintain the confidentiality and integrity in data. …”
    Get full text
    Get full text
    Get full text
    Article