Search Results - (( java implementation rsa algorithm ) OR ( have activation function algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…In the nonlinear ANC literature, various nonlinear algorithms have been introduced. These nonlinear algorithms were employed to improve noise reduction performance. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Improving Photometric Redshifts By Varying Activation Functions In Artificial Neural Networks by Pathi, Imdad Binti Mahmud

    Published 2024
    “…We also tested the performances of these activation functions by varying the depth and width of the ANN architectures.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Application of nature-inspired algorithms and artificial intelligence for optimal efficiency of horizontal axis wind turbine / Md. Rasel Sarkar by Md. Rasel, Sarkar

    Published 2019
    “…The essence of this study is that it compares the effect of activation functions (tansig and logsig) in the performance of time series forecasting since activation function is the core element of any artificial neural network model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    E-Handrawn Calculator by Mohamad, Syamimi

    Published 2008
    “…Backpropagation requires that the activation function used by the artificial neurons (or "nodes") is differentiable. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    PROPOSED METHODOLOGY FOR OPTIMIZING THE TRAINING PARAMETERS OF A MULTILAYER FEED-FORWARD ARTIFICIAL NEURAL NETWORKS USING A GENETIC ALGORITHM by ABDALLA, OSMAN AHMED

    Published 2011
    “…In this thesis, the approach has been analyzed and algorithms that simulate the new approach have been mapped out.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    The effect of adaptive parameters on the performance of back propagation by Abdul Hamid, Norhamreeza

    Published 2012
    “…In this method, each training pattern has its own activation functions of neurons in the hidden layer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…Most of the clustering methods used in the clustering of chemical structures such as Wards, Group Average, K- means and Jarvis-Patrick, are known as hard or crisp as they partition a dataset into strictly disjoint subsets; and thus are not suitable for the clustering of chemical structures exhibiting more than one activity. Although, fuzzy clustering algorithms such as fuzzy c-means provides an inherent mechanism for the clustering of overlapping structures (objects) but this potential of the fuzzy methods which comes from its fuzzy membership functions have not been utilized effectively. …”
    Get full text
    Get full text
    Get full text
    Book Section