Search Results - (( java applications security algorithm ) OR ( quality classification using algorithm ))

Refine Results
  1. 1
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Classification model for water quality using machine learning techniques by Azilawati, Rozaimee, Azrul Amri, Jamal, Azwa, Abdul Aziz

    Published 2015
    “…There is a need to resolve this problem for us to get good water that can be used for domestic purposes. This article proposes a suitable classification model for classifying water quality based on the machine learning algorithms. …”
    Get full text
    Get full text
    Article
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters by Teguh, Sutanto, Muhammad Rafli, Aditya, Haldi, Budiman, M.Rezqy, Noor Ridha, Usman, Syapotro, Noor, Azijah

    Published 2024
    “…This finding emphasizes that Stacking with Gradient Boosting provides much better performance in water quality classification compared to other models. This research provides new insights into the application of machine learning algorithms for water quality management as well as guidance for optimal algorithm selection.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Experimental results show that the developed methods and model are able to classify the Harumanis quality with accuracy of 79% using fuzzy classification based on shape and size.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Real-time power quality disturbance classification using convolutional neural networks by Husodo, Budi Yanto, Dalimi, Rinaldy, Ihsanto, Eko, Gunawan, Teddy Surya

    Published 2020
    “…Experimental results showed that the proposed algorithm produced a good result with the classification accuracy of 97.52% trained using 100 epochs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14
  15. 15

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…The comparison showed that, the accuracy of the unsupervised classification map with value of 88.4% that was generated by using the cluster labelling algorithm was slightly more than the maximum-likelihood supervised classification map with value of 87.5%. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Ant-Miner is a variant of ant colony optimisation and a prominent intelligent algorithm widely use in rules-based classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Agarwood oil quality classification using one versus all strategies in multiclass on SVM model / Aqib Fawwaz Mohd Amidon … [et al.] by Mohd Amidon, Aqib Fawwaz, Mahabob, Noratikah Zawani, Ismail, Nurlaila, Mohd Yusoff, Zakiah, Taib, Mohd Nasir

    Published 2021
    “…So, the output was the classification of quality between low, medium low, medium high or high quality while the input was the abundances (%) of compounds. …”
    Get full text
    Get full text
    Get full text
    Book Section
  19. 19

    Hybrib NSGA-II optimization for improving the three-term BP network for multiclass classification problems by Ibrahim, Ashraf Osman, Shamsuddin, Siti Mariyam, Qasem, Sultan Noman

    Published 2015
    “…This paper presents a hybrid of the multiobjective evolutionary algorithm to gain a better accuracy of the fi nal solutions.The aim of using the hybrid algorithm is to improve the multiobjective evolutionary algorithm performance in terms of the enhancement of all the individuals in the population and increase the quality of the Pareto optimal solutions.The multiobjective evolutionary algorithm used in this study is a nondominated sorting genetic algorithm-II (NSGA-II) together with its hybrid, the backpropagation algorithm (BP), which is used as a local search algorithm to optimize the accuracy and complexity of the three-term backpropagation (TBP) network. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Hybrid NSGA-II Optimization for Improving the Three-Term BP Network for Multiclass Classification Problems by Ibrahim, Ashraf Osman, Shamsuddin, Siti Mariyam, Qasem, Sultan Noman

    Published 2015
    “…The aim of using the hybrid algorithm is to improve the multiobjective evolutionary algorithm performance in terms of the enhancement of all the individuals in the population and increase the quality of the Pareto optimal solutions. …”
    Get full text
    Get full text
    Get full text
    Article