Search Results - (( data information new algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- data information »
- java application »
- information new »
- new algorithm »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
6
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…Other than that, recent advances in the cryptanalysis field motivate new designs. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Article -
7
-
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…This work firstly reveals the significance of attributes in categorical data clustering, and then investigates the limitations of algorithms MMR and G-ANMI respectively, and correspondingly proposes a new attribute-oriented hierarchical divisive clustering algorithm termed Mean Gain Ratio (MGR) and an improved genetic clustering algorithm termed Improved G-ANMI (IG-ANMI) for categorical data. …”
Get full text
Get full text
Thesis -
10
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. The proposed method, which is called MuDi-Stream (Multi Density clustering algorithm for evolving data Stream), is an online-offline algorithm with four main components. …”
Get full text
Get full text
Get full text
Thesis -
11
An extended ID3 decision tree algorithm for spatial data
Published 2011“…As in the ID3 algorithm that use information gain in the attribute selection, the proposed algorithm uses the spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
Get full text
Get full text
Conference or Workshop Item -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
A block cipher based on genetic algorithm
Published 2016“…Other than that, the evolvement of technology will also contribute towards the development of new block ciphers. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Get full text
Get full text
Get full text
Thesis -
14
C4.5 Algorithm Application for Prediction of Self Candidate New Students in Higher Education
Published 2018“…Data mining has background with the condition of an abundance of data (the overload data) and the explosion information faced by companies, institutions or organizations that are stored for many years. …”
Get full text
Get full text
Journal -
15
-
16
-
17
Genetic Algorithm for Web Data Mining
Published 2001“…This study used a prototype program based on genetic algorithm to manipulate the initial set of data. Three sets of inputs were used to generate new populations based on the individual fitness. …”
Get full text
Get full text
Project Paper Report -
18
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
19
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
