Search Results - (( data protection techniques algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- protection techniques »
- application learning »
- learning algorithm »
- java application »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The proposed techniques resulted synchronous LEASE file locking, capturing of state of locks and layouts, Kerberos secured the pNFS locks and layouts on storage, new algorithm enabled the scalable data compression using data block size compression algorithm and better dynamic data protection using RAID.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
A Study And Analysis Of Watermarking Algorithms For Medical Images
Published 2010Get full text
Get full text
Thesis -
9
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
12
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. …”
Get full text
Get full text
Get full text
Article -
13
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. …”
Get full text
Get full text
Article -
14
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. …”
Get full text
Get full text
Get full text
Article -
15
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
16
A Study And Analysis Of Watermarking Algorithms For Medical Images
Published 2010Get full text
Get full text
Thesis -
17
A Framework For Privacy Diagnosis And Preservation In Data Publishing
Published 2010“…Privacy preservation in data publishing aims at the publication of data with protecting private information. …”
Get full text
Get full text
Thesis -
18
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
20
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
