Search Results - (( does solution learning algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Traditional schema theory does not support Lamatckian learning, i.e, forcing the genetic representation to match the solution found by the learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Waste management using machine learning and deep learning algorithms by Sami, Khan Nasik, Amin, Zian Md Afique, Hassan, Raini

    Published 2020
    “…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An improved bees algorithm local search mechanism for numerical dataset by Al-Dawoodi, Aras Ghazi Mohammed

    Published 2015
    “…Furthermore, in this study the feature selection algorithm is implemented and tested using most popular dataset from Machine Learning Repository (UCI). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…How does a person make a right decision ? maybe he learns from past experience or new information he receives. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…While the firefly algorithm solution is superior, it has a higher time complexity compared to other algorithms used when there are more hidden layers and neurons. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…The results showed that the decision algorithm improves the measurement by 28% and the degraded transcoded video does not affect students' comprehension.…”
    Get full text
    Get full text
    Thesis
  14. 14

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Unlike most existing meta-heuristic algorithms, and by virtue of being parameter-free, TLBO does not have any specific parameter controls. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Application of boundary-fitted convolutional neural network to simulate non-Newtonian fluid flow behavior in eccentric annulus by Kumar, A., Ridha, S., Ilyas, S.U., Dzulkarnain, I., Pratama, A.

    Published 2022
    “…Convolutional Networks can learn a complex and high-dimensional functional space solution and may have high accuracy but depend significantly on the quality of training data. …”
    Get full text
    Get full text
    Article
  16. 16

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…The selection would be made based on the hybrid machine learning (ML) algorithm. A fuzzy-based Naive Bayes algorithm has been used in this case. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Nikon Inc. / Muhammad Hasif Anuar by Anuar, Muhammad Hasif

    Published 2022
    “…The Z 7’s autofocus algorithms is just not on the par with those of Nikon DSLRs. …”
    Get full text
    Get full text
    Entrepreneurship Project
  18. 18

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…This is one of the criteria practiced in automated text categorization. Machine learning (ML) based methods are the popular solution for this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Breast cancer detector software (BCDS) using case-based reasoning by Ahmad Bukhari, Abdullah

    Published 2015
    “…The machine learn in other mean the machine save the new case if the new case does not have the highest similarity and the doctor should do the phisycal check. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20