Search Results - (( java implementation rsa algorithm ) OR ( changes applying learning algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- learning algorithm »
- applying learning »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Applying learning to filter text
Published 2005“…The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Advanced machine learning algorithm to predict the implication of climate change on groundwater level for protecting aquifer from depletion
Published 2025“…Ultimately, the results obtained in this study serve as a great benchmark for future GWL prediction using LSTM and XGBoost algorithm and give an insight into the influence of climate change on future GWL. …”
Article -
9
-
10
-
11
Control of a robot arm using iterative learning algorithm with a stopping criterion
Published 2002“…The study introduces the Active Force Control and Iterative Learning Algorithm (AFCAIL) scheme with an improved feature in the form of a suitably designed stopping criterion incorporated in the control strategy. …”
Get full text
Get full text
Get full text
Article -
12
Classification of JPEG files by using extreme learning machine
Published 2018“…The ELM algorithm is applied to RABEI-2017 and DFRWS-2006 datasets. …”
Get full text
Get full text
Article -
13
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…The methods are Byte Frequency Distribution, Entropy, and Rate of Change. Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
Get full text
Article -
14
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
Conference Paper -
15
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
16
-
17
-
18
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…Therefore, we proposed the distance learning environment to change perception about e-learning education system. …”
Get full text
Get full text
Thesis -
19
River flow prediction based on improved machine learning method: Cuckoo Search-Artificial Neural Network
Published 2024“…Therefore, it is necessary to precisely estimate how the river flow will alter as a result of changing rainfall patterns. Finding the best value for the hyper-parameters is one of the problems with machine learning algorithms, which have lately been adopted by many academics. …”
Article -
20
