Search Results - (( java information encryption algorithm ) OR ( binary classifications learning algorithm ))
Search alternatives:
- classifications learning »
- information encryption »
- binary classifications »
- learning algorithm »
- java information »
-
1
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
2
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
7
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…The second objective is to conduct a supervised and binary ensemble machine learning technique for classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A New Quadratic Binary Harris Hawk Optimization For Feature Selection
Published 2019“…A comparative study is conducted to compare the effectiveness of QBHHO with other feature selection algorithms such as binary differential evolution (BDE), genetic algorithm (GA), binary multi-verse optimizer (BMVO), binary flower pollination algorithm (BFPA), and binary salp swarm algorithm (BSSA). …”
Get full text
Get full text
Get full text
Article -
11
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
12
-
13
Analysis Of Personal Protective Equipment Classification Method Using Deep Learning
Published 2022“…Based on the result, CNN algorithm is a good algorithm as the binary classification of PPE achieved high accuracy result.…”
Get full text
Get full text
Undergraduates Project Papers -
14
Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media
Published 2024“…The Multi-Class Multi-Level (MCML) classification algorithm was applied to perform detailed classification and address the limitations of the research scope using several approaches, including machine learning, deep learning, and transfer learning approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem
Published 2023“…The new Binary Whale Optimization Algorithm is integrated with wrapper feature selection and validated on descriptor selection problem to improve Amphetamine-type stimulants drug classification result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A Novel Aggregate Classification Technique Using Moment Invariants and Cascaded Multilayered Perceptron Network
Published 2009“…The c-MLP network consists of three MLPs which are arranged in a serial combination and trained with the same learning algorithm. The proposed method has been tested and compared with twelve machine learning algorithms namely Levenberg-Marquardt (LM), Broyden-Fletcher-Goldfarb-Shanno quasi-newton (BFG), Resilient back propagation (RP), Scaled conjugate gradient (SCG), Conjugate gradient with Powell-Beale restarts (CGB), Conjugate gradient with Fletcher-Reeves updates (CGF), Conjugate gradient with Polak-Ribiere updates (CGP), One step secant (OSS), Bayesian regularization (BR), Gradient descent (GD), Gradient descent with momentum and adaptive learning rate (GDX) and Gradient descent with momentum (GDM) algorithms. …”
Get full text
Get full text
Article -
18
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
19
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
20
