Search Results - (( java implementation rsa algorithm ) OR ( pattern mobile learning algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- learning algorithm »
- mobile learning »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
Published 2016“…The ELM algorithm will be applied to an ultra-mobile Near Infrared (NIR) spectrometer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir
Published 2019“…With this project creates a mobile app that analyse the mood pattern which also correspond with menstrual cycle to be able to predict mood. …”
Get full text
Get full text
Thesis -
8
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…The performance of MANFIE was compared with existing methods in a diversity of practical benchmark applications such as pattern classifications, time series predictions, modeling with inverse learning control and mobile robot navigation. …”
Get full text
Get full text
Thesis -
9
The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali
Published 2006“…Based on the experiment results, it is proved that content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Student Project -
10
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…This project is about predicting energy consumption patterns based on trending videos on YouTube 2021 by using machine learning techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierarchical graph neuron (DHGN) was proposed to be incorporated into a cooperative intrusion detection system (IDS) in mobile ad hoc networks (MANETs). Its one-cycle learning and divide and distribute recognition task approach allows DHGN to detect similar patterns in short of time. …”
Get full text
Book Section -
12
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
13
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An integrated priority-based cell attenuation model for dynamic cell sizing
Published 2012“…Real-time predicted mobile traffic from the EFuNN structure was used to control the size of all the cells.Results obtained demonstrate the robustness of the integrated module in recognizing the temporal pattern of the mobile traffic and dynamically controlling the cell size in order to reduce the number of calls dropped.…”
Get full text
Get full text
Get full text
Article -
17
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…Hagras et al. formulated Fuzzy-Genetic technique to adapt the learning behaviour of an autonomous mobile robot in unstructured and changing environments.…”
Get full text
Get full text
Thesis -
18
An enhanced android botnet detection approach using feature refinement
Published 2019“…That adopts machine learning techniques to classify botware and benign applications. …”
Get full text
Get full text
Thesis -
19
Self-organizing map approach for determining mobile user location using IEEE 802.11 signals
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
20
Pixel-based feature for android malware family classification using machine learning algorithms
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
