Search Results - (( java implementation tree algorithm ) OR ( basic data protection algorithm ))
Search alternatives:
- protection algorithm »
- java implementation »
- implementation tree »
- tree algorithm »
- basic data »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. …”
Get full text
Get full text
Final Year Project -
7
Development of Lightning Protection System (LPS) Designing Tool
Published 2015“…Based on this standard, the data and mathematical equations were obtained to form algorithms whereby it would be used in the software afterwards. …”
Get full text
Get full text
Final Year Project -
8
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
10
-
11
NUMERICAL DIRECTIONAL OVERCURRENT PROTECTION FOR POWER DISTRIBUTION NETWORK
Published 2007“…Some studies have been made to identify several types offaults related to the systems proposed. Every protection systems have three basic components: instrument transformers, relays and circuit breakers. …”
Get full text
Get full text
Final Year Project -
12
-
13
-
14
Robust Image Watermarking Theories and Techniques: A Review
Published 2014“…Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. …”
Get full text
Get full text
Get full text
Article -
15
Enhancement of network security by use machine learning
Published 2019“…The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the security, the system have done automatically protect the data and hence the data is recovered at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Financial advisory and management system
Published 2025“…Basic goal tracking functionality is implemented on the Goal Page, with plans to integrate the Days Needed Calculation Algorithm for real-time progress tracking in future iterations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Analysis of watermarking techniques in video
Published 2011“…Basically digital watermarking involves embedding secret symbols known as watermarks within video data which can be used later for copyright detection purposes. …”
Get full text
Get full text
Conference or Workshop Item
