Search Results - (( java implementation rsa algorithm ) OR ( using table learning algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of a diversified ensemble data summarization (DDS) tool for learning medical data in a multi relational environment by Rayner Alfred, Leau, Yu Beng, Tan, Soo Fun

    Published 2012
    “…This can be achieved by summarizing each table that exists in the database by using a more appropriate data summarization method depending on the type of data stored in each individual table. …”
    Get full text
    Get full text
    Research Report
  7. 7

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…The DARA algorithm will be applied to summarize data stored in the non-target tables by clustering them into groups, where multiple records stored in non­target tables correspond to a single record i,tored in a target table. …”
    Get full text
    Get full text
    Research Report
  8. 8
  9. 9

    Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization by Kamal Zuhairi, Zamli, Din, Fakhrud, Alhadawi, Hussam S.

    Published 2023
    “…Using a Q-learning table, QL-NMR remembers the historical performance of each chaotic map during the S-box construction process allowing just-in-time adaptive selection based on its current performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Deep reinforcement learning to multi-agent deep reinforcement learning by Samieiyeganeh, Mehdi, O. K. Rahmat, Rahmita Wirza, Khalid, Fatimah, Kasmiran, Khairul Azhar

    Published 2022
    “…In fact, overall goal in this paper is a comprehensive explanation of the various Deep Reinforcement Learning (DRL) algorithms, and its combination with Multi-Agent methods. …”
    Get full text
    Get full text
    Article
  11. 11

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review by Goh, Choon-Hian, Ferdowsi, Mahbuba, Gan, Ming Hong, Kwan, Ban-How, Lim, Wei Yin, Tee, Yee Kai, Rosli, Roshaslina, Tan, Maw Pin *

    Published 2024
    “…The aims of the study were to systematically evaluate available machine learning (ML) algorithm for supporting syncope diagnosis to determine their performance compared to existing point scoring protocols. …”
    Get full text
    Get full text
    Article
  13. 13

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…The training phase of the machine learning algorithm used proposed real-time training datasets benchmarked with two training datasets from CICIDS and NSL-KDD. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. The proposed approaches take the advantages of structured peer-to-peer systems where the contents of peers’ caches are shared using Distributed Hash Table (DHT) in order to enhance the performance of the web caching policy. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Prediction of oil and gas pipeline failures through machine learning approaches: A systematic review by Al-Sabaeei, A.M., Alhussian, H., Abdulkadir, S.J., Jagadeesh, A.

    Published 2023
    “…It also provides in-depth details, summarized in tables, on different failure types, commonly used ML algorithms, and data resources, with critical discussions. …”
    Get full text
    Get full text
    Article
  17. 17

    The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip by Muhamad Sarip, Muhamad Shaharudin

    Published 2015
    “…The problems are the pupils not memorized the multiplication tables, error in terms of algorithms, especially involving multiplication of whole numbers with two-digit numbers and errors involving regrouping the product of the multiplication. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Fuzzy rules reduction using rough set approach by Yusof, Norazah, Hamdan, Abdul Razak

    Published 2003
    “…Johnson reducer and Genetic Algorithm reducer are the methods used for computing reducts. …”
    Get full text
    Conference or Workshop Item
  20. 20