Search Results - (( java implementation rsa algorithm ) OR ( using distant learning algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Speech emotion recognition using spectrogram based neural structured learning by Sivan, Dawn, Haripriya, P. H., Jose, Rajan

    Published 2022
    “…The generated features are then used to train and understand the emotions via Neural Structured Learning (NSL), a fast and accurate deep learning approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…In some cases, they are quite distant and sparseness. This uniqueness of Y-STR data has become problematic in partitioning the data using the existing partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Add-on anomaly threshold technique for improving unsupervised intrusion detection on SCADA data by Almalawi, A., Fahad, A., Tari, Z., Khan, A.I., Alzahrani, N., Bakhsh, S.T., Alassafi, M.O., Alshdadi, A., Qaiyum, S.

    Published 2020
    “…Then, the ensemble-based supervised learning is proposed to find a global and efficient anomaly threshold using the information of both â��normalâ��/â��abnormalâ�� behaviours. …”
    Get full text
    Get full text
    Article
  11. 11

    Calibrating hand gesture recognition for stroke Rehabilitation Internet-of-Things (RIOT) using MediaPipe in smart healthcare systems by Zainuddin, Ahmad Anwar, Mohd Dhuzuki, Nurul Hanis, Ahmad Puzi, Asmarani, Johar, Mohd Naqiuddin, Yazid, Maslina

    Published 2024
    “…This work aims to address these issues by calibrating hand gesture recognition systems using the Rehabilitation Internet-of-Things (RIOT) framework and examining the effectiveness of machine learning algorithms in conjunction with the MediaPipe framework for gesture recognition calibration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article