Search Results - (( development processes classification algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- processes classification »
- development processes »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
-
8
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…A method was developed to improve the cluster generation and clusters labelling processes in unsupervised classification of the Landsat TM and MASTER datasets. …”
Get full text
Get full text
Thesis -
9
-
10
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
Get full text
Get full text
Thesis -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
12
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…Subsequently, the integration of embedded correlation-based filtering algorithm has further increased the classification accuracy of training process and testing process by 4.93% and 14.73% respectively. …”
Get full text
Get full text
Get full text
Thesis -
13
A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network
Published 2014“…Among numerous artificial intelligence approaches, k-Nearest Neighbor algorithms, genetic algorithms, and artificial neural networks are considered as the most common and effective methods in classification problems in numerous studies. …”
Get full text
Get full text
Get full text
Article -
14
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Some algorithms can be defined if the developer of the system has problem specific knowledge to the solution. …”
Get full text
Get full text
Monograph -
15
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Due to that reason, this study attempts to use SVM algorithm on employee’s performance databases for talent classification. …”
Get full text
Get full text
Research Reports -
16
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
17
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Parallel processing and matrix convolution inside wavelet transform process is the most prominent study in this research. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Using convolution neural networks for improving customer requirements classification performance of autonomous vehicle
“…Customer requirements are vital information prior to the early stage of autonomous vehicle (AV) development processes. In the development process of AV many decisions have been made concerning customer requirements at the first stage. …”
Get full text
Get full text
Get full text
Article -
19
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
