Search Results - (( program using cross algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- cross algorithm »
- application rsa »
- program using »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Midblock signalled pedestrian crossing : alternative controller algorithms
Published 2000“…The measures of performance of all algorithms are evaluated using a fully calibrated and validated simulation program. …”
Get full text
Get full text
Get full text
Article -
8
Case Slicing Technique for Feature Selection
Published 2004“…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
Get full text
Get full text
Thesis -
9
-
10
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…The Multimodal Transformer Fusion (MMTF) model uses the cross-modal attention mechanisms to combine these streams of data to produce unified emotional representations. …”
Get full text
Get full text
Article -
11
Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat
Published 2022“…Hyper-parameter tuning has been used in all the algorithms using k-fold cross validation to have the best accuracy and to avoid the over-fitting issue. …”
Get full text
Get full text
Get full text
Thesis -
12
Euclidean space data projection classifier with cartesian genetic programming (CGP)
Published 2018“…This research work is a preliminary work which proposes an evolutionary-based classifier using a simplified Cartesian Genetic Programming (CGP) evolutionary algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
14
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
Get full text
Get full text
Conference or Workshop Item -
15
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…The correlation is used in chiller algorithms for quick and accurate prediction of compressor energy consumption. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…In addition to that,tenfold cross validation is used to validate the performance of the proposed method. …”
Get full text
Get full text
Thesis -
19
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…In addition to that,tenfold cross validation is used to validate the performance of the proposed method. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…The objective of this research is to develop and compare various ANN spray drying coconut milk models. Firstly, using MATLAB program, the ANN model is developed based on optimized topology and is then furthered optimized by genetic algorithm (GA) and particle swarm optimization (PSO) using MINITAB program. …”
Get full text
Get full text
Thesis
