Search Results - (( java application mining algorithm ) OR ( using vector encryption algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing the RC4 algorithm by eliminating the Initiative Vector (IV) transmission by Waleed Abdelrahman Yousif Mohammed, Salmah Fattah, Khalid Mohammed Osman Saeed, Ashraf Osman Ibrahim Elsayed, Safaa Eltahier

    Published 2025
    “…This paper introduces an innovative approach to address the vulnerabilities of the RC4 encryption algorithm by employing an Initiative Vector (IV). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection by S. M. M Yassin, S. M. Warusia Mohamed, Abdollah, Mohd Faizal, Mohd, Othman, Ariffin, Aswami

    Published 2022
    “…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail by Abdul Rahim, Siti Khatijah Nor, Ismail, Siti Rozanae

    Published 2006
    “…However, we also constructed an algorithm for a parallel version of Vector Addition Chains to enhance the performance. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation by Ismail, Mohd. Izuan

    Published 2006
    “…With implementation on Altera’s APEX FPGA, experimental evaluation of the AES Crypto-Processor running at 50 MHz using test vector provided in FIPS (2002) yields an average encryption rate at 188.24 Mb/s and decryption rate at 200 Mb/s which makes the overall performance is at 192.12 Mb/s. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Access control and classifier-based blockchain technology in e-healthcare applications by Maseleno A., Hashim W., Perumal E., Ilayaraja M., Shankar K.

    Published 2023
    “…After this procedure comes the BT approach, which is connected to protect sensitive data using various layers of encryption, and decryption processes. …”
    Book Chapter
  15. 15

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Steganalysis Classification Algorithm Based on Distinctive Texture Features by Hammad B.T., Ahmed I.T., Jamil N.

    Published 2023
    “…Steganalysis is a technique for identifying hidden messages embedded in digital material without having to know the embedding algorithm or the �non-stego� image. Due to their enormous feature vector dimension, which requires more time to calculate, the performance of most existing image steganalysis classification (ISC) techniques is still restricted. …”
    Article
  17. 17