Search Results - (( pattern classification bees algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- pattern classification »
- classification bees »
- bees algorithm »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Application of the bees algorithm to the selection features for manufacturing data
Published 2007“…The Bees Algorithm is employed to select an optimal set of features for a particular pattern classification task. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Neural Network Training Using Hybrid Particle-move Artificial Bee Colony Algorithm for Pattern Classification
Published 2017“…The performance of the HPABC algorithm was investigated on four benchmark pattern-classification datasets and the results were compared with other algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Neural network training using hybrid particle-move artificial bee colony algorithm for pattern classification
Published 2017“…In this work, we aimed to highlight the performance of the Hybrid Particle-move Artificial Bee Colony (HPABC) algorithm by applying it on the ANNT application.The performance of the HPABC algorithm was investigated on four benchmark pattern-classification data sets and the results were compared with other algorithms.The results obtained illustrate that HPABC algorithm can efficiently be used for ANNT.HPABC outperformed the original ABC and PSO as well as other state-of-art and hybrid algorithms in terms of time, function evaluation number and recognition accuracy.…”
Get full text
Get full text
Get full text
Article -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
7
-
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
10
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
11
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
12
Design And Implementation Of Human Crowd Density Estimation System With Energy Harvesting In Wireless Sensor Network Platform
Published 2017“…These factors are then integrated into the proposed H-CDE algorithm. The H-CDE algorithm and its crowd classification yielded an average of 71.2 % accuracy in identifying the level of crowd density, which is the best compared to other algorithms found in the literature. …”
Get full text
Get full text
Thesis
