Search Results - (( based applications learning algorithm ) OR ( some application rsa algorithm ))*
Search alternatives:
- applications learning »
- based applications »
- learning algorithm »
- some application »
- application rsa »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
3
-
4
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
5
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
6
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
8
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
9
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
10
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
11
-
12
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects:Conference paper -
13
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
Published 2018“…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
Get full text
Get full text
Get full text
Article -
14
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…In this paper, we propose a generalized RBF (GRBF) model to reduce the number of basis functions and thus alleviate curse of dimensionality. An EM-based training algorithm is also introduced, which uses fewer parameters compared to some classical supervised learning methods. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Performance of correlational filtering and deep learning based single target tracking algorithms / ZhongMing Liao and Azlan Ismail
Published 2023“…This paper closely follows the tracking framework of target tracking algorithms and discusses in detail the traditional visual target tracking methods, the mainstream single target tracking algorithms based on correlation filtering, and the video single target tracking algorithms based on deep learning. …”
Get full text
Get full text
Get full text
Article -
16
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
17
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
Article -
18
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…With the goal of enhancing the autonomy in mobile robot navigation, numerous algorithms (traditional AI-based, swarm intelligence-based, self-learning-based) have been built and implemented independently, and also in blended manners. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Opposition-based learning simulated kalman filter for Numerical optimization problems
Published 2016“…The SKF with opposition-based learning is also applied as adaptive beamforming algorithm for adaptive array antenna. …”
Get full text
Get full text
Research Book Profile -
20
Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy
Published 2020“…In addition, the ranked order of the variables based on their importance differed across the ML algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
