Search Results - (( structures perceptions learning algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Rahman, Md. Arafatur, Alenezi, Ali H.

    Published 2022
    “…To address this, A reward function is being developed to deal with the challenge of multiple vehicle collision avoidance. A perception network structure based on formation and on actor-critic methodologies is employed to enhance the decision-making process. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Rahman, Md. Arafatur, Alenezi, Ali H.

    Published 2022
    “…To address this, A reward function is being developed to deal with the challenge of multiple vehicle collision avoidance. A perception network structure based on formation and on actor-critic methodologies is employed to enhance the decision-making process. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli by Ramli, Muhammad Izzad

    Published 2018
    “…Based on the prosody analysis, a grammar-based prosody modification rules are proposed by integrating grammatical structure. Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Application of artificial neural network in discriminating the agarwood oil quality using significant chemical compounds / Mohd Hezri Fazalul Rahiman … [et al.] by Rahiman, Mohd Hezri Fazalul, Ismail, Nurlaila, Taib, Mohd Nasir, Mohd Ali, Nor Azah, Tajuddin, Saiful Nizam

    Published 2014
    “…Data Processing - ANN Application ( Data pre-processing using Z-score, ANN design structure/architecture - parameter optimisation, training and testing the algorithm) Result & Discussion: ANN parameter optimisation - final error for learning rate, momentum rate and hidden layer size ANN final design parameter - Nodes in input layer: 7, Nodes in hidden layer size: 2, Output layer size: 1, learning rate: 0.9, Momentum rate: 0.7, Error goal: 0.01, Epochs: 100 ANN prediction: high accuracy for training and testing prediction (refer to the figure in poster) Patent & List of contributions: 1. …”
    Get full text
    Get full text
    Get full text
    Book Section