Search Results - (( identification implementation learning algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Identification model for hearing loss symptoms using machine learning techniques by Nasiru Garba Noma

    Published 2014
    “…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Gender identification using support vector machines by Nur Ayuni Binti Jalaluddin

    Published 2023
    “…This thesis is introduces SVM theory application and its algorithmic implementations.…”
    text::Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The proposed algorithm is able to improve the weaknesses in PQF model in updating and learning the important attributes for software quality assessment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Computationally efficient sequential learning algorithms for direct link resource-allocating networks by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2005
    “…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
    Get full text
    Get full text
    Article
  11. 11

    Mobile application: coin identification using machine learning / Dania Qistina Mohd Nazly by Mohd Nazly, Dania Qistina

    Published 2021
    “…With the rise of mobile technology and Internet access, recent developments in machine learning have designed many algorithms to solve diverse human problems. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques by Muhammad Afnan, Mohammad Nasir

    Published 2022
    “…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Author identification for under-resourced language Kadazandusun by Nursyahirah, Tarmizi, Suhaila, Saee, Dayang Hanani, Abang Ibrahim

    Published 2020
    “…The workflow of Author Identification implements the machine learning approach to solve the single-labelled multi-class problem and predict the author of a given message in KadazanDusun. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues by Aisyah, Yunus, Norfilza, Mohd Mokhtar, Raja Affendi, Raja Ali *, Siti Maryam, Ahmad Kendong, Hajar, Fauzan Ahmad

    Published 2024
    “…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    Deep Learning Based Face Attributes Recognition by Saidi, Mohamad Hazim

    Published 2018
    “…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
    Get full text
    Get full text
    Monograph
  20. 20

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. …”
    Get full text
    Get full text
    Get full text
    Article