Search Results - (( java applications security algorithm ) OR ( parameter classification system algorithm ))

Refine Results
  1. 1
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Adaptive parameter control strategy for ant-miner classification algorithm by Al-Behadili, Hayder Naser Khraibet, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…FESSIC outperforms other algorithms for average classification accuracy for the KSVM, MLP, RF and DT classifiers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Affect classification using genetic-optimized ensembles of fuzzy ARTMAPs by Liew, W.S., Seera, M., Loo, C.K., Lim, E.

    Published 2015
    “…In addition, manual design of classification tasks often uses sub-optimum classifier parameter settings, leading to average classification performance. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…The objective of this research is to comparatively evaluate the effectiveness of different algorithms, method combination procedure, and their parameters towards classification accuracy. …”
    Get full text
    Get full text
    Proceeding
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Development of an intelligent prediction tool for rice yield based on machine learning techniques by Md. Sap, Mohd. Noor, Awan, A. M.

    Published 2006
    “…Support vector machine algorithm is developed for classification of rice plantation data. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20