Search Results - (( developing learning adoption algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B., Alsewari, Abdulrahman A.

    Published 2015
    “…In doing so, this paper reviews two existing parameter free optimization algorithms involving Teaching Learning Based Optimization (TLBO) and Fruitfly Optimization Algorithm (FOA) in an effort to promote their adoption for CIT.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. Machine learning algorithms have widely been adopted recently to enhance the performance of IDSs. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Correlation model in the adoption of E-payment services: A machine learning approach by Tan, Xi En

    Published 2022
    “…This is a novel method, as we do not need to rely on statistical analysis, rather we can automate the process of identifying important features using machine learning models. The end goal of the project is to develop a model that identifies the important features that affect user intention to adopt e-payment.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…This study adopted supervised machine learning algorithm which is the Support Vector Machine (SVM) for classification. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Transfer Learning is one of the common methods. Various algorithms under Transfer Learning had been developed for different applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Testing the use of machine learning for heritage property valuation / Junainah Mohamad, Nur Shahirah Ja’afar and Suriatini Ismail by Mohamad, Junainah, Ja’afar, Nur Shahirah, Ismail, Suriatini

    Published 2021
    “…However, the application of machine learning in heritage property valuation has limited adoption. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Owing to its proven performance in many other optimization problems, the adoption of the parameter-free Teaching Learning-based Optimization (TLBO) algorithm as a new t-way strategy is deemed useful. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm by Kamal Z., Zamli, Fakhrud, Din, Nazirah, Ramli, Ahmed, Bestoun S.

    Published 2019
    “…This paper describes the adoption of Fuzzy Adaptive Fuzzy Teaching Learning based Optimization (ATLBO) for software module clustering problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Hybrid Intelligent Warning System for Boiler tube Leak Trips by Singh, D., Ismail, F.B., Shakir Nasif, M.

    Published 2017
    “…The Extreme Learning Machine (ELM) methodology was also adopted in IWS-1 and compared with traditional training algorithms. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
    Article