Search Results - (( java application rsa algorithm ) OR ( user optimization learning algorithm ))
Search alternatives:
- optimization learning »
- learning algorithm »
- user optimization »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Deep reinforcement learning approaches for multi-objective problem in Recommender Systems
Published 2022“…This study proposes deep reinforcement learning approaches based on Deep Q-Network to improve multi-objective optimization in recommendation environment and investigated its capability to optimizing precision, novelty, and diversity concurrently. …”
Get full text
Get full text
Thesis -
6
Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building
Published 2023“…EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. A comparative analysis is conducted with other well-known algorithms such as Particle Swarm Optimization (PSO), Differential Evolution (DE), Ant Colony Optimization (ACO), Biogeography-Based Optimization (BBO), Teaching-Learning Based Optimization (TLBO), and Beluga Whale Optimization (BWO). …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…GA assists in optimizing the search process and performs machine learning. …”
Conference paper -
8
Dynamic user preference parameters selection and energy consumption optimization for smart homes using deep extreme learning machine and bat algorithm
Published 2020“…We applied a deep extreme learning machine approach to predict the user parameters. …”
Get full text
Get full text
Get full text
Article -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
Deep Learning Based Face Attributes Recognition
Published 2018“…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
Get full text
Get full text
Monograph -
11
An energy-efficient spectrum-aware reinforcement learning-based clustering algorithm for cognitive radio sensor networks
Published 2015“…In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. …”
Get full text
Get full text
Get full text
Article -
12
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
13
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022“…A step towards long network performance optimization is theterm use of deep reinforcement learning (DRL), which can learn the best policy via interaction with the environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
User-centric learning for multiple access selections
Published 2019“…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
Conference Paper -
16
-
17
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). …”
Get full text
Get full text
Get full text
Article -
18
User-centric learning for multiple access selections
Published 2023“…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
Article -
19
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). …”
Get full text
Get full text
Article -
20
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…In this model, the static, dynamic and automated analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
Proceedings Paper
