Search Results - (( variable activation function algorithm ) OR ( java information computational algorithm ))
Search alternatives:
- information computational »
- function algorithm »
- java information »
- variable »
- activation »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
-
3
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019Get full text
Get full text
Get full text
Article -
6
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
11
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
Get full text
Get full text
Get full text
Article -
12
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
13
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
-
17
-
18
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
Get full text
Get full text
Article -
19
A survey of energy-aware real time scheduling tools
Published 2015Get full text
Get full text
Conference or Workshop Item -
20
