Search Results - (( java application rsa algorithm ) OR ( sequence identification learning algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…At the same time, there has been growing interest from the research community in machine learning based detection of diseases using sequence based on gut microbiome data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues by Aisyah, Yunus, Norfilza, Mohd Mokhtar, Raja Affendi, Raja Ali *, Siti Maryam, Ahmad Kendong, Hajar, Fauzan Ahmad

    Published 2024
    “…•Detailed method to identify the gut mycobiome in colorectal cancer patients using ITS-specific amplicon sequencing. •Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…This proposed algorithm is compared with other published methods in terms of frame level accuracy and learning time of dance session. …”
    Article
  10. 10

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…The features are reduced using the particle swarm optimization detection technique in video image sequences to reduce the computational complexity. If the scene is stationary, the identification of the moving people is addressed based on the correlation tracking technique. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…Building on the previous work of yourself and others. Transfer of learning and viewing each problem as a learning opportunity. …”
    Get full text
    Get full text
    Article
  14. 14

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…Researchers have worked on ideas to improve exploration capability to prevent premature convergence by trying prediction operators, opposition-based learning, and different iteration strategies. There were also attempts to hybridize SKF with other famous algorithms such as Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Sine Cosine Algorithm (SCA) to improve its performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item