Search Results - (( structured solution learning algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network by Gao, Yuan, Mohd Kasihmuddin, Mohd Shareduwan, Chen, Ju, Zheng, Chengfeng, Romli, Nurul Atiqah, Mansor, Mohd. Asyraf, Zamri, Nur Ezlin

    Published 2024
    “…It aimed to optimize the performance of G-type random high-order satisfiability logic structures embedded in Discrete Hopfield Neural Networks, thereby enhancing the efficiency of the Hopfield Neural Network learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. Uavs offers a versatile and cost-effective solution for capturing high-resolution orthophotos of large and hard-to-reach concrete structures. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. Uavs offer a versatile and cost-effective solution for capturing high-resolution orthophotos of large and hard-to-reach concrete structures. …”
    Get full text
    Get full text
    Student Project
  10. 10

    An improved artificial bee colony algorithm for training multilayer perceptron in time series prediction by Shah, Habib

    Published 2014
    “…Backpropagation (BP) learning algorithm is the well-known learning technique that trained ANN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. The proposed approaches take the advantages of structured peer-to-peer systems where the contents of peers’ caches are shared using Distributed Hash Table (DHT) in order to enhance the performance of the web caching policy. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…Additionally in solving ill-structured problems, people may need to use more than a heuristic or an algorithmic strategy; insight may be required. …”
    Get full text
    Get full text
    Article
  14. 14

    Parse tree visualization for Malay sentence (BMTutor) by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2015
    “…In Malaysia, various efforts have been made by the government and language researchers in improving student’s ability of mastering Malay language (BM) due to their poor ability in grammar and sentence structure. In terms of technology, to date, there is no computer software or a prototype that is available that can help students in learning the BM sentence structure.Thus, BMTutor is introduced as a solution to this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A Study On AI-Driven Solutions for Cloud Security Platform by Menaga, Segar, Mohamad Fadli, Zolkipli

    Published 2024
    “…Finally, this research seeks to help organizations protect cloud structures and resources using intentioned AI solutions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The experimental results demonstrate that the proposed algorithm is competitive compared to the state-of-the-art semi-supervised learning algorithms in terms of accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Super-opposition spiral dynamic-based fuzzy control for an inverted pendulum system by Ahmad Azwan, Abdul Razak, Ahmad Nor Kasruddin, Nasir, Nor Maniha, Abd Ghani

    Published 2022
    “…The SDA is a simple-structured and deterministic type of algorithm, which also performs competitively in terms of solution accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementing BiSM and CCL algorithm for managing audio storage by Hamzah, Hammuzamer Irwan, Low, Tan Jung

    Published 2012
    “…Therefore, this paper analyzed the issues and proposed a solution to manage the audio storage.The elements from biological inspired components were studied and identified to seek for the requirements of Bio-Inspired Storing Model (BiSM).Then a structural architecture of BiSM was designed in addition the Cognitive and Constructive Learning (CCL) algorithm was proposed.Finally, BiSM and CCL algorithm were evaluated with exemplar application settings and the results were presented in a case study of MP3 music collections.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Integrated bisect K-means and firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2016
    “…Such a result indicates that the proposed Bisect FA is a competitive algorithm for unsupervised learning.…”
    Get full text
    Get full text
    Get full text
    Article