Search Results - (( frames operation learning algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Our deep learning method also performs the atomic morphological operations and shadow removal based on the hue saturation value color space. …”
    Get full text
    Get full text
    Article
  7. 7

    A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model by Ouwabunmi, Babalola AbdulHafeez

    Published 2025
    “…This study presents the development and evaluation of a novel hybrid machine learning algorithm that integrates the strengths of Random Forest and Gradient Boosting models to enhance the prediction of smORFs. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Vibration Signal for Bearing Fault Detection using Random Forest by Abedin T., Koh S.P., Yaw C.T., Phing C.C., Tiong S.K., Tan J.D., Ali K., Kadirgama K., Benedict F.

    Published 2024
    “…Fourth, the RF algorithm classifier recognized the data frame's actual predictions, which were 99% correct for normal bearings, 97% accurate for outer races, 94% accurate for inner races, and 97% accurate for roller element faults. …”
    Conference Paper
  10. 10

    Image processing based vehicle detection and tracking method by Bhaskar, P.K., Yong, S.-P.

    Published 2014
    “…First, we differentiate the foreground from background in frames by learning the background. Here, foreground detector detects the object and a binary computation is done to define rectangular regions around every detected object. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…Machine learning frameworks have been utilised to facilitate intelligence as operational mechanism in intelligence embedded system such as learning system, prediction protocol and robot navigation system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Vibration signal for bearing fault detection using random forest by Tarek, Abedin, Koh, Siaw Paw, Yaw, Chong Tak, Phing, Chen Chai, Tiong, Sieh Kiong, Tan, Jian Ding, Kharudin, Ali, Kadirgama, Kumaran, Benedict, Foo

    Published 2023
    “…Fourth, the RF algorithm classifier recognized the data frame's actual predictions, which were 99% correct for normal bearings, 97% accurate for outer races, 94% accurate for inner races, and 97% accurate for roller element faults. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Therefore, this thesis explores and studies public hardhat datasets, deep learning algorithms, power Internet of Things (PIoT), and edge computing to address the above issues. …”
    Get full text
    Get full text
    Thesis
  14. 14