Search Results - (( java implementation rsa algorithm ) OR ( basic enhancing learning algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- learning algorithm »
- basic enhancing »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…An enhanced Bucket Brigade Algorithm (BBA) is developed to avoid the problem of choosing classifiers with high strength value but with incorrect behaviour. …”
Get full text
Get full text
Thesis -
7
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
Get full text
Get full text
Thesis -
8
Enhancement of network security by use machine learning
Published 2019“…By the end of the research, graphs and animation system have done shown to demonstrate the basic operation of the enhance network with machine learning system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The important study in this research is an automated learning system for deep learning to enhance security. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
11
-
12
Kodepoly: an engaging approach to blended futuristic learning in coding
Published 2024“…In conclusion, Kodepoly demonstrates significant potential in enhancing coding education through a blended, futuristic learning model. …”
Get full text
Get full text
Proceeding Paper -
13
Segmentation and Grading of Sinus Images
Published 2010“…In this project, a trajectory-learning algorithm using contourlets is proposed to enhance the CT sinus image without sacrificing accuracy. …”
Get full text
Get full text
Final Year Project -
14
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…Machine learning (ML) can enhance a dermatologist’s work, from diagnosis to customized care. …”
Get full text
Get full text
Get full text
Article -
15
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
16
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Traditional learning-based boundary extraction algorithms classify each pixel edge separately and then get boundaries from the local decisions of a classifier. …”
Get full text
Get full text
Thesis -
17
Campus study buddy : collaborative learning and resource sharing app
Published 2024“…The final deliverable of the project is an Android mobile application that integrates Google Cloud and Google Firebase while providing basic functions. The delivered application allows users to get started quickly and allows students to use it as a learning companion to enhance the learning experience. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Assessing the potential of laboratory instructional tool through Synthesia AI: a case study on student learning outcome / Jacqueline Joseph
Published 2023“…This research study aims to investigate the effectiveness of utilizing Synthesia Artificial Intelligence (AI), an advanced instructional tool, in enhancing laboratory experiments. The research focused on evaluating the impact of incorporating Synthesia AI as a supplementary learning resource on student learning outcomes in laboratory settings. …”
Get full text
Get full text
Get full text
Article -
19
Restock management system by using market basket analysis / Nazrin Adnan
Published 2016“…This study is focus on Market Basket Analysis which is analyze the customer purchase behavior from previous purchases by using apriori algorithm. Market Basket Analysis will analyze the frequent itemset that has been brought by customer while apriori algorithm will learn step by step each of the item through the purchases history. …”
Get full text
Get full text
Thesis -
20
Email spam classification based on deep learning methods: A review
Published 2025“…The evolution of spam filtering has progressed considerably, transitioning from basic rule-based filters to more sophisticated machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article
