Search Results - (( federation classifications using algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- classifications using »
- protection algorithm »
- using algorithm »
- federation »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Identification and Grading of Manage Using Image Processing
Published 2021“…The criteria of mangos to be assessed by the grading algorithm are color and weight. Classification of these mangos are conducted based on standards set by Federal Agriculture Marketing Authority (FAMA) mango ripeness index, Project activities have started using a proposed activity flow for algorithm development using Python and the experimental chamber setup for actual mange data collection. …”
Get full text
Get full text
Final Year Project -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
9
-
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
12
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
15
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
16
Non-invasive diagnosis of risk in dengue patients using bioelectrical impedance analysis and artificial neural network
Published 2010“…The ANN was trained via the steepest descent back propagation with momentum algorithm using the log-sigmoid transfer function while the sum-squared error was used as the network's performance indicator. …”
Get full text
Get full text
Get full text
Article -
17
A comparative study on aviation arrival delay prediction using machine learning methods
Published 2023“…Hence, the best performing method in this research can be used to predict flight arrival delays to reduce the above-mentioned flight delay costs and aid the classification of high or low risks of the insured to be used as input for future work to calculate insurance premium based on the sum of mean and standard deviation of losses.…”
Get full text
Thesis
