Search Results - (( java pattern classification algorithm ) OR ( using negative encryption algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A secure, anonymous and verifiable E-Voting system by Ooi, Elynn

    Published 2020
    “…Therefore, this paper studies the disadvantages of the existing voting system by looking through the method used by the society. Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION by BHATTACHARJEE, SHILADITYA

    Published 2017
    “…Henceforth, this research addresses these security issues collectively without negatively affecting each other. It increases confidentiality and offers a backup for accidental data loss by combining Simplified Encryption Standard (SDES) and an advanced pattern generation technique which uses a unique pattern generation table. …”
    Get full text
    Get full text
    Thesis