Search Results - (( java data protection algorithm ) OR ( basic computing machine algorithm ))
Search alternatives:
- protection algorithm »
- machine algorithm »
- basic computing »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
-
3
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Comparative study on job scheduling using priority rule and machine learning
Published 2021“…We’ve achieved better for SJF and a decent machine learning algorithm outcome as well.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
9
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
10
-
11
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The results show proposed algorithm approximately solved problems averagely 22% better in terms of find feasible optimal solutions depends of various performance measures in 72.2% of computational time than other previous considered key algorithms.…”
Get full text
Get full text
Thesis -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Development of virtual control panel for single spindle configuration 2-axis filament winding machine(SSFWM)
Published 2009Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
Published 2013“…Each category of jobs is served along with First-Come First-Served (FCFS) basic using the Multiple Queues Multiple Machines (MQMM) configuration. …”
Get full text
Get full text
Thesis -
16
-
17
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
18
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
19
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
20
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis
