Search Results - (( java implementation path algorithm ) OR ( based encryption machine algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- encryption machine »
- machine algorithm »
- path algorithm »
-
1
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…This study proposed a pre-encryption detection framework for crypto-ransomware using a machine learning approach. …”
Get full text
Get full text
Get full text
Article -
2
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
3
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
Get full text
Get full text
Thesis -
4
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
5
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The pairing-based encryption known as "DNA sequence Enhanced Advanced Encryption Standard (EAES)" can be used to protect medical ECG signals that are stored in the cloud for healthcare purposes using the nebula network architecture. …”
Get full text
Get full text
Get full text
Thesis -
7
Packet header support using hybrid security approach for securing trivial file transfer protocol in machine to machine applications / Nur Nabila Mohamed
Published 2019“…Here in this thesis study, a feasible hybrid security extension has been incorporated into the protocol combining the Hash-based Message Authentication Code and Diffie Hellman Key Exchange (HMAC-DHKE) to enable key agreement and Advanced Encryption Standard (AES) algorithm to perform data encryption/decryption. …”
Get full text
Get full text
Thesis -
8
-
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
10
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. …”
Get full text
Get full text
Thesis -
12
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
13
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
14
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…By using Fermat's theorem can be speed up the RSA Encryption.…”
Get full text
Get full text
Get full text
Article -
15
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
16
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
17
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
19
Access control and classifier-based blockchain technology in e-healthcare applications
Published 2023Book Chapter -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
