Search Results - (( java implementation rsa algorithm ) OR ( program selection machine algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- program selection »
- selection machine »
- machine algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
7
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
8
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
9
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
10
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
Double-layered hybrid neural network approach for solving mixed integer quadratic bilevel problems
Published 2010Get full text
Book chapter -
13
A new domain specific scripting language for automated machine learning pipeline
Published 2019“…From the varieties of the machine learning algorithms, selecting the best model with the best configurations is a critical and complex design issue. …”
Get full text
Get full text
Article -
14
Optimization of milling parameters using ant colony optimization
Published 2008“…In process planning of conventional milling, selecting reasonable milling parameters is necessary to satisfy requirements involving machining economics, quality and safety. …”
Get full text
Get full text
Undergraduates Project Papers -
15
DESIGN AND DEVELOPMENT OF HIGH-ACCURACY MACHINE FOR WIRE BENDING
Published 2023“…Firstly, using the proposed bending machine, in which the proposed algorithm is applied. …”
Article -
16
-
17
-
18
-
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
20
Poverty Classification of Central Perak Population Using Machine Learning
Published 2019“…In this study, back propagation algorithm and other machine learning algorithm will be used to build models via anaconda using python programming language that can classify each poor household appropriate their poverty status. …”
Get full text
Get full text
Final Year Project
