Search Results - (( developing users prevention algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- prevention algorithm »
- application testing »
- testing algorithm »
- developing users »
- users prevention »
- java application »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Besides, the proposed MRA is effective in preventing FOA attack. A majority of the survey participants also stated that the proposed cued recall methods can aid users in memorising their password.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
11
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
Get full text
Get full text
Monograph -
14
-
15
-
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Library reservation system using face detection / Nik Ruslawati Nik Mustapa and Nur Athikah Fatehah Rosli
Published 2022“…The room needs to be reserved beforehand for the user to use. This situation has become a problem for users as the user’s desired room may be occupied by other users. …”
Get full text
Get full text
Get full text
Article -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article
