Search Results - (( java application rsa algorithm ) OR ( parameter identification learning algorithm ))
Search alternatives:
- parameter identification »
- identification learning »
- learning algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…This thesis proposes derivative free learning, using finite difference, methods for fixed size RBF network in comparison to gradient based learning for the application of system identification. …”
Get full text
Get full text
Get full text
Thesis -
6
A multi-objective genetic type-2 fuzzy extreme learning system for the identification of nonlinear dynamic systems
Published 2017“…The proposed algorithm benefits from the combination of extreme learning machine (ELM) and non-dominated sorting genetic algorithm (NSGAII) to tune the parameters of the consequent and antecedent parts of the IT2FLS, respectively. …”
Get full text
Get full text
Article -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
Wavelet network based online sequential extreme learning machine for dynamic system modeling
Published 2013“…This attains good performance at extremely fast learning. The initial kernel parameters of WN played a big role to ensure fast and better learning performance. …”
Get full text
Conference or Workshop Item -
9
Simultaneous computation of model order and parameter estimation for system identification based on opposition-based simulated Kalman filter
Published 2018“…Simultaneous Model Order and Parameter Estimation (SMOPE) has been proposed to address system identification problem efficiently using optimization algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
11
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
12
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
Get full text
Get full text
Thesis -
13
Wavelet network: online sequential extreme learning machine for nonlinear dynamic systems identification
Published 2015“…A single hidden layer feedforward neural network (SLFN) with online sequential extreme learning machine (OSELM) algorithm has been introduced and applied in many regression problems successfully. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The method of selection of the input variables, the number of rules, and the learning rate are briefly discussed. Three methods for choosing the initial parameter of the fuzzy model are considered, namely the on-line, the off-line, and the random initial parameters. …”
Get full text
Get full text
Get full text
Article -
16
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
17
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…Recently, an online sequential extreme learning machine (OSELM) algorithm has been introduced based on extreme learning machine (ELM) theories for single hidden layer feedforward neural networks (SLFN) and has been applied for different online applications. …”
Get full text
Get full text
Thesis -
18
Deep Learning Based Face Attributes Recognition
Published 2018“…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
Get full text
Get full text
Monograph -
19
Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm
Published 2025“…This sampling technique enables the identification of 10 related data features including temperature, voltage, and current, recorded during each charging cycle from the LIB parameters. …”
Article -
20
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Firstly, the line operation parameters and loop line testing parameters are collected and used to analyze. …”
Get full text
Get full text
Get full text
Article
