Search Results - (( evolution classification modeling algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- evolution classification »
- classification modeling »
- program implementation »
- modeling algorithm »
- implementation rsa »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
6
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
-
8
Classification of Immunosignature Using Random Forests for Cancer Diagnosis
Published 2015“…In this work, we will develop a robust classification model that can be utilized in cancer diagnosis using immunofingerprint data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
-
11
-
12
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
13
Deep learning detector for pests and plant disease recognition
Published 2020“…Meanwhile, evolution in deep convolutional neural networks for image classification has rapidly improved the accuracy of object detection, classification and system recognition. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Finally, a new logic mining model namely Y-Type Random 2-Satisfiability Reverse Analysis was proposed, which showed optimal performances in terms of several metrics as compared to the existing classification models. …”
Get full text
Get full text
Thesis -
15
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. …”
Get full text
Get full text
Thesis -
16
Digital economy tax compliance model in Malaysia using machine learning approach
Published 2021“…The experimental results show that the ensemble method can improve the single classification model’s accuracy with the highest classification accuracy of 87.94% compared to the best single classification model. …”
Get full text
Get full text
Get full text
Article -
17
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Feature selection was used to sort out key features for further classification. News classification into factors affecting stock market turning point was done using Naïve Bayes, Deep Learning, Generalized Linear Model (GLM) and Support Vector Machine (SVM). …”
Get full text
Get full text
Book Section -
18
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
Get full text
Get full text
Article -
19
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
20
Diagnosis of voice disorders using band energy spectrum in wavelet domain
Published 2011Get full text
Working Paper
