Search Results - (( java implementation rsa algorithm ) OR ( usage patterns machine algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- machine algorithm »
- rsa algorithm »
- patterns »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Design of a pattern classification system using extreme learning machine
Published 2024text::Final Year Project -
7
Design of a pattern classification system using extreme learning machine
Published 2023text::Final Year Project -
8
Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm
Published 2022“…The outcomes demonstrate the superiority of the Support Vector Machine algorithm in terms of achieved maximum score and minimum error. …”
Get full text
Get full text
Article -
9
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. …”
Get full text
Get full text
Get full text
Article -
11
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…In High-performance Computing (HPC) applications, the resource usage pattern varies over time, making it challenging to track resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
12
Mel Frequency Cepstral Coefficient (MFCC) extraction for speaker identification on FPGA
Published 2009Get full text
Working Paper -
13
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…As artificial intelligence (AI) is a very wide subject, two specific areas are chosen to illustrate the practical usage of machine learning frame-works. For the first part, intelligence embedded system has been utilised to improve performance and .secondly, tackling the issues in games and gamification technology. …”
Get full text
Get full text
Thesis -
14
Analyzing UiTMCTKKT vehicle utilization and travel pattern using predictive analytics
Published 2025“…Two key experiments were conducted using machine learning models. The Experiment 1 focused on classifying vehicle types based on utilization and Experiment 2 involved predicting no of trips per day using classifiers such as Random Forest, Decision Tree, and Support Vector Machine (SVM). …”
Get full text
Get full text
Student Project -
15
A review on classifying and prioritizing user review-based software requirements
Published 2024“…Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
Get full text
Get full text
Get full text
Article -
16
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
17
Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat
Published 2025“…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
Get full text
Get full text
Get full text
Article -
18
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
Get full text
Get full text
Article -
19
A study on component-based technology for development of complex bioinformatics software
Published 2004“…From the enriched GO tree, the BTreeBicluster algorithm is applied during the clustering process. …”
Get full text
Get full text
Monograph -
20
Development of a simulation-based decision support model for high precision component manufacturer
Published 2013“…In such configurations, a job may undergo operations only in certain orders of machines and not necessarily at every machine. The complexity is further compounded by the indefinite batch size for each product. …”
Get full text
Get full text
Get full text
Get full text
Thesis
