Search Results - (( using permutation table algorithm ) OR ( java classification using algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The fuzzy inference model will be used to capture both fasting and non-fasting membership functions before feeding the results for classification to the neural network model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis