Search Results - (( java applications security algorithm ) OR ( using function mining algorithm ))
Search alternatives:
- java applications »
- mining algorithm »
- function mining »
- using function »
-
1
-
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
4
Tree-based contrast subspace mining method
Published 2020“…Those subspaces are termed as contrast subspaces. All existing mining contrast subspace methods (i.e. CSMiner and CSMiner-BPR) use density-based likelihood contrast scoring function to estimate the likelihood of a query object to target class against other class in a subspace. …”
Get full text
Get full text
Get full text
Thesis -
5
Evaluation of data mining models for predicting concrete strength
Published 2024“…The best performing model is selected and used to generate different sets objective-function that will be selected and used in a Particle Swarm Optimization algorithm to solve a single objective optimization problem that finds the optimal values of each concrete feature to maximize the strength of concrete. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
9
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
10
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
Get full text
Get full text
Thesis -
11
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
12
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
Get full text
Get full text
Thesis -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
15
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article -
16
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
17
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…The objectives of this research are data mining are used to extract useful data from sales and product. …”
Get full text
Get full text
Thesis -
18
An application of IPA approach on the optimization of a mining port stockyard system
Published 2002“…The results show that PARMSR algorithm applying IPA can be used to estimate the optimal cost function in subsystem 1 with a high level of confidence. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
A Study Of Open-Source Data Mining Tools For Forecasting
Published 2015“…Weka and RapidMiner have most of the desire characteristic for a fully-functional and flexible platform therefore their use can be recommended for most of DM tasks.…”
