Search Results - (( java data protection algorithm ) OR ( based constructive method algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
    Get full text
    Get full text
    Research Report
  7. 7

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Ant system-based feature set partitioning algorithm for classifier ensemble construction by Abdullah, , Ku-Mahamud, Ku Ruhana

    Published 2016
    “…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Knowledge base processing method based on text classification algorithm by Baisheng Zhong, Mohd Shamrie Sainin, Tan Soo Fun

    Published 2023
    “…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Instead, it is suggested that results be verified with an alternative method of assessing risk, such as RASH. In conclusion, RASH is an alternative and effective method for the assessment of safety and health risks in building construction in Oman.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map by Alzaidi, Amer Awad, Ahmad, Musheer, Ahmed, Hussam S., Al Solami, Eesa

    Published 2018
    “…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Sequential constructive algorithm incorporate with fuzzy logic for solving real world course timetabling problem by Tan, Li June, Joe H. Obit, Leau, Yu Beng, Jetol Bolongkikit, Rayner Alfred

    Published 2020
    “…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem by Sultana, Tanzima, Akhand, Md Aminul Haque, Rahman, M.M. Hafizur

    Published 2017
    “…Route generation is a traveling sales man problem (TSP) and any TSP optimization method is useful for this purpose. Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Optimized feature construction methods for data summarizations of relational data by Sze, Florence Sia Fui

    Published 2014
    “…In this thesis, novel feature construction methods are introduced and a question of whether or not the descriptive accuracy of the summarized data can benefit from the novel feature construction methods is investigated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20