Search Results - (( java implementation rsa algorithm ) OR ( using continuous training algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems by Bibi Amirah Shafaa, Emambocus

    Published 2024
    “…The ANNs trained by the optimized DA also achieve higher accuracy than those trained by some other swarm intelligence algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Malay continuous speech recognition using continuous density hidden Markov model by Ting, Chee Ming

    Published 2007
    “…This thesis describes the investigation of the use of Continuous Density Hidden Markov Model (CDHMM) for Malay Automatic Speech Recognition (ASR). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of real-time embedded system with speech recognition for smart house by Yahya, Zuraimi, Sheikh Salleh, Sheikh Hussain, Syed Abu Bakar, Syed Abdul Rahman

    Published 2007
    “…In SI task, 40 speakers, different from the training speakers, with each recorded 2 tokens are used for testing. …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…The abnormal PPG pattern detection using rule-based algorithm has produced accuracy of 87.30% in training process and 87.18% in testing process with coverage of rule for training and testing, 89.26% and 87.33%. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Tracing the real power transfer of individual generators to loads using least squares support vector machine with continuous genetic algorithm by Mohd Wazir, Mustafa, Saifulnizam, Abd.Khalid, Mohd Herwan, Sulaiman, Siti Rafidah, Abd Rahim, Omar, Aliman, Shareef, Hussain

    Published 2011
    “…This paper attempts to trace the real power transfer of individual generators to loads in pool based power system by incorporating the hybridization of Least Squares Support Vector Machine (LS-SVM) with Continuous Genetic Algorithm (CGA)- CGA-LSSVM. The idea is to use CGA to find the optimal values of regularization parameter, γ and Kernel RBF parameter, σ 2 , and adapt a supervised learning approach to train the LS-SVM model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network by Mohamad, M., Abdullah, E.F.H.S., Ghaleb, S.A.A., Ghanem, W.A.H.M.

    Published 2021
    “…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Intelligent Sensor Data Pre-processing Using Continuous Restricted Boltzmann Machine by Suhaimi, Emil Zaidan

    Published 2007
    “…The noise inputs cause neurons to have continuous-valued, probabilistic outputs. The use ofstochastic neurons in CRBMgives it modelingflexibility that is useful with real data. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…The BP algorithm uses the data partitioning method with columnwise block striped and the batch mode weight updating strategy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Text Categorization Using Naive Bayes Algorithm by Wan Hazimah, Wan Ismail

    Published 2005
    “…This paper presents text categorization system based on naive Bayes algorithm. This algorithm has long been used for text categorization tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A simplified PID-like ANFIS controller trained by genetic algorithm to control nonlinear systems by Lutfy, Omar Farouq, Mohd Noor, Samsul Bahari, Marhaban, Mohammad Hamiruce, Abbas, Kassim A.

    Published 2010
    “…In addition, the real-coded Genetic Algorithm (GA) has been utilized to train this ANFIS controller, instead of the hybrid learning methods that are widely used in the literature, and hence, the necessity for the teaching signal required by other techniques has been eliminated. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Intelligent grading of agarwood essential oil quality using artificial neural network (ANN) / Noratikah Zawani Mahabob by Mahabob, Noratikah Zawani

    Published 2022
    “…The result revealed that the ANN performance had the highest accuracy when training using the LM training algorithm. The ANN with the seven inputs (seven significant compounds from Z-score pre-processing technique) trained by one hidden neuron of LM algorithm provided the best performance with 100% for accuracy, specificity, sensitivity and precision as well as minimum convergence epoch.…”
    Get full text
    Get full text
    Thesis
  19. 19

    A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition by Ayu, Media Anugerah, Ismail, Siti Aisyah, Abdul Matin, Ahmad Faridi, Mantoro, Teddy

    Published 2012
    “…Our earlier research has shown that data from mobile-phone embedded accelerometer can be used for activity recognition purpose [1]. As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The data source used as training data comes from the official Kaggle website, the data used in this study is data on the spread of the coronavirus collected from 2020 to 2021 with a total of 20,816 training data. …”
    Get full text
    Get full text
    Book Section