Search Results - (( java application rsa algorithm ) OR ( _ realization learning algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…However, Chinese language features are rich and fuzzy, and the training optimization of lip-reading model requires high GPU computation and storage, so it is difficult to realize large-scale application. Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Topological Clustering via Adaptive Resonance Theory With Information Theoretic Learning by Masuyama, Naoki, Loo, Chu Kiong, Ishibuchi, Hisao, Kubota, Naoyuki, Nojima, Yusuke, Liu, Yiping

    Published 2019
    “…In contrast, the proposed algorithm realizes a stable computation and reduces the number of parameters compared to existing algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    Investigation of cross-entropy-based streamflow forecasting through an efficient interpretable automated search process by Chong K.L., Huang Y.F., Koo C.H., Sherif M., Ahmed A.N., El-Shafie A.

    Published 2024
    “…Due to the distinctive characteristics of these two adopted forms, selecting the correct algorithm for the machine learning problem along with their hyperparameter tuning process is critical to the realization of the desired results. …”
    Article
  9. 9

    Underwater Image Recognition using Machine Learning by Divya, N.K., Manjula, Sanjay Koti, Priyadarshini, S

    Published 2024
    “…It encompasses the procedure for feeding algorithms information to create the algorithms realize patterns in the data and then increase the performance of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Deep Learning Based Face Attributes Recognition by Saidi, Mohamad Hazim

    Published 2018
    “…With the introduction of Deep Learning (DL), the concept of Convolutional Neural Network (CNN) that was once an idea can be realized. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Application of target detection method based on convolutional neural network in sustainable outdoor education by Yang, Xiaoming, Samsudin, Shamsulariffin, Wang, Yuxuan, Yuan, Yubin, Tengku Kamalden, Tengku Fadilah, Yaakob, Sam Shor Nahar

    Published 2023
    “…The acquisition system of underwater camera information of manned submersibles is designed through the Single Shot-MultiBox Detector algorithm of deep learning. Furthermore, CNN is adopted to classify the underwater target images, which realizes the intelligent detection and classification of underwater targets. …”
    Get full text
    Get full text
    Article
  13. 13

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…They does not realized by applying e-learning concept will give more benefits to both lecturer and students. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms by Loo, C.K., Liew, W.S., Seera, M., Lim, Einly

    Published 2015
    “…An optimal ensemble was realized by the inter-classifier diversity of its constituents. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…The results obtained by utilizing Immune Network in sentiment mining are not very impressive compared to other Machine Learning algorithms. The algorithms can be improved furthermore by including other disciplines such as Natural Language Processing (NLP) or others. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network by Mustapha, Ibrahim

    Published 2016
    “…Simulation results show convergence, learning and adaptability of the RL based algorithms to dynamic environment toward achieving the optimal solutions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mobility, Residual Energy, and Link Quality Aware Multipath Routing in MANETs with Q-learning Algorithm by Tilwari, Valmik, Dimyati, Kaharudin, Hindia, Mhd Nour, Fattouh, Anas, Amiri, Iraj

    Published 2019
    “…The MRLAM scheme uses a Q-Learning algorithm for the selection of optimal intermediate nodes based on the available status of energy level, mobility, and link quality parameters, and then provides positive and negative reward values accordingly. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20