Search Results - (( java implementation rsa algorithm ) OR ( gave activation function algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- function algorithm »
- rsa algorithm »
- activation »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Cardiac abnormality prediction using tansig based multilayer perceptron
Published 2021“…In this study all MLP networks were activated using the Tansig activation function.…”
Get full text
Get full text
Get full text
Article -
7
IMPACT OF NUMBER OF ATTRIBUTES ON THE ACCURACY OF HUMAN MOTION CLASSIFICATION
Published 2018“…The impact of the number of attributes on classification accuracy is evaluated via Bayes, Function, Lazy, Meta, Rule and Trees classifier algorithms supported by the WEKA tool. …”
Get full text
Get full text
Article -
8
Application of orthogonal optimization and feedforward backpropagation model in the microwave extraction of natural antioxidants from tropical white pepper
Published 2018“…This was achieved by evaluating different algorithms, transfer functions, and neurons. The result obtained from the orthogonal parametric study gave an optimal antioxidant activity of 91.02% at irradiation time of 120 min, microwave power level of 350 W, particle size of 0.300 mm, and liquid-to-solid ratio of 6 mL/g. …”
Get full text
Get full text
Get full text
Article -
9
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…Among these classifiers, FT gave the highest accuracy (95%) and true positive rate (TPR) (96.7%) with the use of only six features.…”
Get full text
Get full text
Article -
10
A review of slicing techniques in software engineering
Published 2015“…Software testing is regarded as an activity to evaluate the functionality and features of a system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…Among these classifiers, FT gave the highest accuracy (95%) and true positive rate (TPR) (96.7%) with the use of only six features.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Optimization and selection of maintenance policies in an electrical gas turbine generator based on the hybrid reliability-centered maintenance (RCM) model
Published 2020“…Reliability-centered maintenance (RCM) is a methodology for choosing what maintenance activities have to be performed to keep the asset working within its designed function. …”
Get full text
Get full text
Get full text
Article -
13
Development of reliability-centered maintenance model using linguistic failure mode and effect analysis
Published 2019“…Moreover, Reliability Centered Maintenance (RCM) is a methodology to choose what maintenance activities have to be performed to keep the asset working within its designed function. …”
Get full text
Get full text
Thesis
