Search Results - (( java implementation mining algorithm ) OR ( parameters data encryption algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- parameters data »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
-
5
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
6
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…TCP protocol can be used in the transmission of data from one host to another host. Simply, it is unsecure because the attacker can break security parameters to obtain access to the data that currently being sent. …”
Get full text
Get full text
Thesis -
7
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
8
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
9
A modified approach to improve the performance of AES using feistel structure
Published 2018“…In encryption algorithm design, apart from the security performance, processing performance and the cost of the implementation are very important trade-off parameters. …”
Get full text
Get full text
Thesis -
10
An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats
Published 2023“…It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. In this article, we consider different significant algorithms utilized for data decryption and encryption in whole areas, for making a comparative study for most vital algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…The aim of this paper is to design dynamic S-Box which depends on rounds keys for encryption in AES-128. The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. …”
Get full text
Get full text
Conference or Workshop Item -
13
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
Get full text
Get full text
Thesis -
14
-
15
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For high security, encryption is one of the methods used to protect data against leakage. …”
Get full text
Get full text
Get full text
Thesis -
17
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…Storage encryption (data at-rest) has now become an important aspect in today’s computing environment. …”
Get full text
Get full text
Thesis -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
19
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
20
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Obfuscatable Aggregatable Signcryption (OASC) is the combination of cryptography technique such as digital signature with data encryption and obfuscation to protect data in the IoT system. …”
Get full text
Get full text
Thesis
