Search Results - (( developing knowledge encryption algorithm ) OR ( java feature classification algorithm ))
Search alternatives:
- feature classification »
- knowledge encryption »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…There arc 3 types of encryption algorithm provided which are 3-DES , RC 4 and RC2. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
6
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
8
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
Get full text
Get full text
Thesis -
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
10
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For secure communication that is reliable, secure, and has good performance, the focus is on developing Double Encryption System (DES). The combination of synchronization of chaos and symmetric encryption is called DES. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
13
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
14
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section
