Search Results - (( java application using algorithm ) OR ( using message selection algorithm ))
Search alternatives:
- selection algorithm »
- message selection »
- java application »
- using algorithm »
-
1
Message based random variable length key encryption algorithm.
Published 2009“…A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
2
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
3
Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi
Published 2012“…This project is designed using negative selection algorithm to automatically classify the Twitter’s messages into its sentiment’s category based on important keyword recognition. …”
Get full text
Get full text
Thesis -
4
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…Two multiple selection algorithm, which are known as “static filter range selection algorithm” and “self-scalable selection algorithm” are proposed. …”
Get full text
Get full text
Thesis -
5
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
6
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. Loo et. al. (2002) has proposed a statistical selection algorithm with the same objective and run in multicast / broadcast environment that has been proved that it is the best among others in terms of the number of messages needed to complete the searching process. …”
Get full text
Get full text
Get full text
Article -
7
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
8
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…In this study, we propose a random selection of pixels that hold a secret message based on an integer solution of the elliptic curve equation. …”
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
A novel and high capacity audio steganography algorithm based on adaptive data embedding positions
Published 2023“…Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms. © Maxwell Scientific Organization, 2014.…”
Article -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
15
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The algorithm is able to reduce the number of messages needed and increases the success rate of all multiple selections in the selection process compared to the previous multiple selection algorithms proposed by Loo in 2005.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Thesis -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis
