Search Results - (( java implementation rsa algorithm ) OR ( knowledge detection based algorithm ))
Search alternatives:
- java implementation »
- knowledge detection »
- implementation rsa »
- detection based »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
An algorithm for Elliott Waves pattern detection
Published 2018“…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
7
An algorithm for Elliott Waves pattern detection
Published 2018“…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
8
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
9
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
11
Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant
Published 2008“…The recent work presents a new method of fault diagnosis based on artificial neural networks and genetic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Leaf lesion classification (LLC) algorithm based on artificial bee colony (ABC)
Published 2015“…In this paper, an algorithm to classify leaf disease severity based on lesions is presented. …”
Get full text
Get full text
Get full text
Article -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…Viola-Jones algorithm is utilized for face detection. Upon acquiring the face location, the knowledge-based method is implemented to locate the eye and the mouth. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
19
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
20
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article
