Search Results - (( java implementation bees algorithm ) OR ( using text data algorithm ))
Search alternatives:
- java implementation »
- implementation bees »
- bees algorithm »
- data algorithm »
- text data »
-
1
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
Get full text
Get full text
Student Project -
2
Optimized clustering with modified K-means algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Thesis -
3
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analysing the different time taken for both AES and DES , experiment was done by three different file sizes and also file types, such as text, image and voice to test the encryption and decryption time taken on existing algorithm DES and proposed algorithm, in conclusion, all the results of our propose algorithm shows AES takes lesser time compare to DES. …”
Get full text
Get full text
Thesis -
4
Sentiment classification for malay newspaper using clonal selection algorithm / Nur Fitri Nabila Mohamad Nasir
Published 2013“…The experimental results show that our method can achieve better performance in clonal selection algorithm sentiment classification and the data collected cannot be used at once in this model because training data is very time-consuming if using all the data. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm.
Published 2013“…How to reduce execution time in searching large amount of data? In this paper, text searching algorithm is using to study the relationship between performance of computer and amount of energy produced in serial and parallel text searching algorithm. …”
Get full text
Get full text
Final Year Project -
9
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019Get full text
Get full text
Thesis -
12
Encryption selection for WLAN IEEE802.11G
Published 2013“…The data size of text file used were 50 bytes to 300 bytes. …”
Get full text
Get full text
Thesis -
13
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
14
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Thesis -
15
-
16
Replica Creation Algorithm for Data Grids
Published 2012Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
20
