Search Results - (( java implementation rsa algorithm ) OR ( basic complex machine algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- machine algorithm »
- rsa algorithm »
- basic complex »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Particle swarm optimization (PSO) for CNC route problem
Published 2002“…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
Get full text
Get full text
Undergraduates Project Papers -
7
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
8
Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets
Published 2025“…Therefore, in this article, we introduced the notion of complex picture fuzzy sets and investigated their basic properties. …”
Article -
9
Cycle time minimization in production line using robust hybrid optimization algorithm
Published 2021“…The results obtained from their research have clearly portrayed the robustness of bio-inspired algorithms to cater complex problems. Assembly line, which is normally the last step of production that involves final assembly of the products. …”
Get full text
Get full text
Conference or Workshop Item -
10
Shot boundary detection based on orthogonal polynomial
Published 2019“…The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
Get full text
Get full text
Get full text
Article -
11
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The previous study found that the scheduling activity become complex when dealing with large number of machine, m > 2, it is NP-hardness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021
Published 2022“…In addition, the review paper will facilitate researchers who are new to machine learning algorithms for brain tumor recognition to understand the basics of the field and pave the way for them to be able to contribute to this vital field of medical research. …”
Get full text
Get full text
Get full text
Article -
14
Review of deep convolution neural network in image classification
Published 2017“…With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditional machine learning methods. …”
Get full text
Get full text
Get full text
Article -
15
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
16
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
Published 2021“…The extracted features are evaluated through six machine learning (ML) classifiers namely softmax, k-nearest neighbor (kNN), support vector machine, linear discriminant analysis, decision tree, and naive Bayes. …”
Get full text
Get full text
Get full text
Thesis -
17
HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text
Published 2021“…Our method works better than other basic and CNN and RNN based hybrid models. In the future, we will work for more levels of text emotions from long and more complex text.…”
Get full text
Get full text
Get full text
Article -
18
Handover Parameter for Self-optimisation in 6g Mobile Networks: A Survey
Published 2024journal::journal article
