Search Results - (( data protection method algorithm ) OR ( java evaluation model algorithm ))
Search alternatives:
- protection method »
- method algorithm »
- java evaluation »
- model algorithm »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
3
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
Get full text
Get full text
Get full text
Article -
6
Protection of the texts using Base64 and MD5
Published 2012“…So using the two protection methods together will increase the security level for protecting the data.…”
Get full text
Get full text
Get full text
Article -
7
Discovering decision algorithm from a distance relay event report
Published 2009“…In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. …”
Get full text
Get full text
Get full text
Article -
8
User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop
Published 2017“…The current methods of authentication are not secure enough to protect data from malicious users. …”
Get full text
Get full text
Student Project -
9
-
10
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
Get full text
Get full text
Thesis -
12
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. …”
Get full text
Get full text
Get full text
Article -
13
A Study Of Salting Method for Image Protection
Published 2013“…This paper describes the study on benefit and importance of the implementation of Salting Method for protection of images stored in an online server database. …”
Other -
14
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
15
Color Image Watermarking For Copyright Protection
Published 2005“…Watermarking is an effective and potential method for copyright protection in digital audio, image and video data. …”
Get full text
Get full text
Monograph -
16
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Role-based access control model in materialized view has been proposed to protect customer's data. However, relying on role only is insufficient and inefficient to protect data especially sensitive attributes. …”
Get full text
Get full text
Thesis -
18
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013“…The objective of this paper demonstrating CARCA method to encrypt the outputted hash digest generated by Gear hash function for protecting the digital Holy Quran.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
20
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article
