Search Results - (( java implementation rsa algorithm ) OR ( knowledge based normalization algorithm ))
Search alternatives:
- normalization algorithm »
- java implementation »
- based normalization »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021Get full text
Get full text
Conference or Workshop Item -
7
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…There are different techniques used in RS. Some works are based on user past knowledge known as Content Based (CB) while more popular techniques referred to as neighborhood models (CF and MF) are based on finding similar users for recommendation. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…But all the clustering tool available are not suitable enough for a normal people that does not have expert knowledge in this field. …”
Get full text
Get full text
Thesis -
9
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
Get full text
Get full text
Article -
11
Cognitive knowledge-based model for adaptive feedback: A case in physics / Andrew Thomas Bimba
Published 2019“…The model uses the Cognitive Knowledge Base (CKB) to represent knowledge as a formal concept based on an Object-Attribute-Relation (OAR) model. …”
Get full text
Get full text
Get full text
Thesis -
12
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
Get full text
Get full text
Citation Index Journal -
13
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
Get full text
Get full text
Conference or Workshop Item -
14
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
15
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
What, how and when to use knowledge in neural network application
Published 2004“…The aim of the study is to describe the general methodology that normally applies in any neural network based application. …”
Get full text
Get full text
Conference or Workshop Item -
18
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
19
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…The recorded data were screened on data normalization while the outliers were discarded prior to regression analysis aided by the Waikato Environment for Knowledge Analysis (WEKA) tool. …”
Get full text
Get full text
Thesis -
20
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis
