Search Results - (( wandering optimization method algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application rsa »
- rsa algorithm »
- wandering »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Mussels wandering optimization algorithmn based training of artificial neural networks for pattern classification
Published 2013“…Traditional training algorithms have some drawbacks such as local minima and its slowness.Therefore, evolutionary algorithms are utilized to train neural networks to overcome these issues.This research tackles the ANN training by adapting Mussels Wandering Optimization (MWO) algorithm.The proposed method tested and verified by training an ANN with well-known benchmarking problems.Two criteria used to evaluate the proposed method were overall training time and classification accuracy.The obtained results indicate that MWO algorithm is on par or better in terms of classification accuracy and convergence training time.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
Published 2015“…In addition, training NN is still highly-time consuming. The Mussels Wandering Optimization (MWO) is a recent metaheuristic optimization algorithm inspired ecologically by mussels movement behavior. …”
Get full text
Get full text
Thesis -
5
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Electrocardiogram based heart disease diagnosis using artificial intelligence
Published 2015“…Accordingly, the first step is an image segmentation method using proposed thresholding algorithms has been used to locate objects and boundaries of the ECG signal and background grid lines in the ECG images. …”
Get full text
Get full text
Thesis
