Search Results - (( java implementation learning algorithm ) OR ( using preventive encryption algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- using preventive »
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Get full text
Article -
2
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…The file is encrypted and using this key to decrypt it. In this study existing algorithm DES is a symmetric-key block cipher. …”
Get full text
Get full text
Thesis -
3
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
4
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
7
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
Get full text
Get full text
Article -
8
Message based random variable length key encryption algorithm.
Published 2009“…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
9
Encryption Technology on Windows Workstation
Published 2004“…The purpose of this study is to develop a new type of encryption methodbased on RSAtechnique. In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. …”
Get full text
Get full text
Final Year Project -
10
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
Get full text
Get full text
Thesis -
11
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Encryption is the one of the most secured way using prevent unauthorized access. …”
Get full text
Get full text
Get full text
Article -
12
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
An e-voting application using cryptography technology
Published 2020“…In order to improve the security and confidentiality of the system, this system will also use the hashing function to complete. Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). …”
Get full text
Get full text
Get full text
Thesis -
15
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
16
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
18
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
19
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
20
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project
