Search Results - (( using (vectorisation OR vectorization) bat algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    A Hybrid Least Squares Support Vector Machine with Bat and Cuckoo Search Algorithms for Time Series Forecasting by Mohammed, Athraa Jasim, Ghathwan, Khalil Ibrahim, Yusof, Yuhanis

    Published 2020
    “…Hence, to enhance the search ability of Cuckoo Search, it is integrated with Bat algorithm that offers a balanced search between global and local. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    The Integration of Nature-Inspired Algorithms with Least Square Support Vector Regression Models: Application to Modeling River Dissolved Oxygen Concentration by Yaseen, Zaher, Ehteram, Mohammad, Sharafati, Ahmad, Shahid, Shamsuddin, Al-Ansari, Nadhir, El-Shafie, Ahmed

    Published 2018
    “…The current study investigates an improved version of Least Square Support Vector Machines integrated with a Bat Algorithm (LSSVM-BA) for modeling the dissolved oxygen (DO) concentration in rivers. …”
    Get full text
    Get full text
    Article
  9. 9

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…However, they have their useful lives and will degrade over time. This issue prompts to be solved using predictive analytics to predict the Remaining Useful Life (RUL) of equipment. …”
    Get full text
    Get full text
    Article
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  11. 11