Search Results - (( wandering optimization method algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Mussels wandering optimization algorithmn based training of artificial neural networks for pattern classification by Abusnaina, Ahmed A., Abdullah, Rosni

    Published 2013
    “…Traditional training algorithms have some drawbacks such as local minima and its slowness.Therefore, evolutionary algorithms are utilized to train neural networks to overcome these issues.This research tackles the ANN training by adapting Mussels Wandering Optimization (MWO) algorithm.The proposed method tested and verified by training an ANN with well-known benchmarking problems.Two criteria used to evaluate the proposed method were overall training time and classification accuracy.The obtained results indicate that MWO algorithm is on par or better in terms of classification accuracy and convergence training time.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks by Abusnaina, Ahmed A. A.

    Published 2015
    “…In addition, training NN is still highly-time consuming. The Mussels Wandering Optimization (MWO) is a recent metaheuristic optimization algorithm inspired ecologically by mussels movement behavior. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Electrocardiogram based heart disease diagnosis using artificial intelligence by Hussain Kareem, Khleaf

    Published 2015
    “…Accordingly, the first step is an image segmentation method using proposed thresholding algorithms has been used to locate objects and boundaries of the ECG signal and background grid lines in the ECG images. …”
    Get full text
    Get full text
    Thesis