Search Results - (( java implementation 5s algorithm ) OR ( based encryption learning algorithm ))

Refine Results
  1. 1

    RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection by S. M. M Yassin, S. M. Warusia Mohamed, Abdollah, Mohd Faizal, Mohd, Othman, Ariffin, Aswami

    Published 2022
    “…This study proposed a pre-encryption detection framework for crypto-ransomware using a machine learning approach. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization by Kamal Zuhairi, Zamli, Din, Fakhrud, Alhadawi, Hussam S.

    Published 2023
    “…This paper introduces a new variant of the metaheuristic algorithm based on the naked mole rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for substitution box construction and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Implementing server-side federated learning in an edge-cloud framework for precision aquaculture by Ng, Bryan Jing Hong

    Published 2025
    “…In this project, research and literature reviews were conducted to explore the current technologies in smart aquaculture, federated learning, and data privacy. Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20