Search Results - (( developing quality encryption algorithm ) OR ( java data classification algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    An overview of video encryption techniques by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran

    Published 2010
    “…A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…This paper outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. …”
    Conference paper
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Major problems in classification task are large amount of training data, large number of features and different behavior of data streams that reduce accuracy and increase computational cost in classifier training phase. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A study of watermarking methods in medical application by Ng, Lee Ping

    Published 2004
    “…The three methods of medical image watermarking that have been studied are Least Significant Bit (LSB), Rivest, Shamir and Adleman (RSA) encryption and decryption with LSB, RSA encryption and decryption with feature-based. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
    Get full text
    Get full text
    Get full text
    Book Section
  19. 19

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    A Steganalysis Classification Algorithm Based on Distinctive Texture Features by Hammad B.T., Ahmed I.T., Jamil N.

    Published 2023
    “…In general, the cover image and the encrypted image are symmetrical in terms of dimension size, resolution, and qualities. …”
    Article