Search Results - (( java applications security algorithm ) OR ( variables classification methods algorithm ))
Search alternatives:
- variables classification »
- classification methods »
- java applications »
- methods algorithm »
-
1
-
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
7
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Intelligent classification algorithms in enhancing the performance of support vector machine
Published 2019“…The average classification accuracies for the proposed ACOMV–SVM and IACOMV-SVM algorithms are 97.28 and 97.91 respectively. …”
Get full text
Get full text
Get full text
Article -
9
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
10
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…The focus of this thesis is on solvingclustering and classification problems. Specifically, we will focus on new optimization methods for solving clustering and classification problems. …”
Get full text
Get full text
Thesis -
12
Using fuzzy association rule mining in cancer classification
Published 2011“…A wide variety of cancer datasets have been implemented by the various methods of gene selection and classification to identify the behavior of the genes in tumors and find the relationships between them and outcome of diseases. …”
Get full text
Get full text
Article -
13
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…All algorithms showed more stability and accuracy when training size applied is more than 6% by the Equal Sample Rate (ESR) method with six variables. …”
Get full text
Get full text
Thesis -
14
Improving the tool for analyzing Malaysia’s demographic change: data standardization analysis to form geo-demographics classification profiles using k-means algorithms
Published 2016“…Clustering is one of the important methods in data exploratory in this era because it is widely applied in data mining.Clustering of data is necessary to produce geo-demographic classification where k-means algorithm is used as cluster algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
16
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
17
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article -
18
Pattern Recognition for Human Diseases Classification in Spectral Analysis
Published 2022“…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The experimental results demonstrate the superior classification performance of the proposed methods over the previous methods. …”
Get full text
Get full text
Thesis
