Search Results - (( java applications security algorithm ) OR ( using vectorization learning algorithm ))
Search alternatives:
- using vectorization »
- learning algorithm »
- java applications »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
-
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
5
Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr...
Published 2024“…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
Article -
6
Support directional shifting vector: A direction based machine learning classifier
Published 2021“…In this article, we have focused on developing a model of angular nature that performs supervised classification. Here, we have used two shifting vectors named Support Direction Vector (SDV) and Support Origin Vector (SOV) to form a linear function. …”
Get full text
Get full text
Get full text
Article -
7
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
Article -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
11
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…In machine learning, there are three type of learning branch that can used in classification procedures for data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
15
Sentiment Analysis on COVID-19 Vaccine Tweets using Machine Learning and Deep Learning Algorithms
Published 2023“…Machine learning algorithms like Logistic Regression, Naïve Bayes, Support Vector Machine (SVM) and others, and Deep Learning algorithms like LSTM and Bert were used to train the predictive models. …”
Get full text
Get full text
Article -
16
Sentiment Analysis on COVID-19 Vaccine Tweets using Machine Learning and Deep Learning Algorithms
Published 2023“…Machine learning algorithms like Logistic Regression, Naïve Bayes, Support Vector Machine (SVM) and others, and Deep Learning algorithms like LSTM and Bert were used to train the predictive models. …”
Get full text
Get full text
Article -
17
-
18
-
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Mapping the distribution of oil palm using Landsat 8 data by comparing machine learning and non-machine learning algorithms
Published 2019“…Landsat 8 images of resolutions 15 x 15 m were used and classified via machine learning and non-machine learning algorithms. …”
Get full text
Get full text
Get full text
Article
