Search Results - (( java implementation level algorithm ) OR ( using detection learning algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article
  6. 6
  7. 7
  8. 8

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  9. 9

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  12. 12

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm by Lau , Jason Kim Wee

    Published 2013
    “…The application also aims to select the best algorithm to detect chords and display the chords detection in pictorial form for easier understanding. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A review of object detection in traffic scenes based on deep learning by Zhao, Ruixin, Tang, SaiHong, Supeni, Eris Elianddy, Abdul Rahim, Sharafiz, Fan, Luxin

    Published 2024
    “…It introduces techniques for optimizing object detection algorithms, summarizes commonly used object detection datasets and traffic scene datasets, along with evaluation criteria, and performs comparative analysis of the performance of deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Early detection of dengue disease using extreme learning machine by Suhaeri, Suhaeri, Mohd Nawi, Nazri, Fathurahman, Muhamad

    Published 2018
    “…The availability of nowadays clinical data of Dengue disease can be used to train machine learning algorithm in order to automaticaly detect the present of Dengue disease of the patients. …”
    Get full text
    Get full text
    Article