Search Results - (( (variable OR variables) extraction using algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- extraction using »
- java application »
- using algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Classification for large number of variables with two imbalanced groups
Published 2020“…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Strategies of Handling Different Variables Reduction for LDA
Published 2012“…Meanwhile, principal component analysis is used to extract important information from the original variables. …”
Get full text
Get full text
Get full text
Article -
8
Optimized clustering with modified K-means algorithm
Published 2021“…Clustering technique is able to find hidden patterns and to extract useful information from huge data. Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Optimal timber transportation planning in tropical hill forest using bees algorithm
Published 2022“…The model uses grid cell-sized 10 m x 10 m characterised with timber locations, volume and fixed and variable costs to represent the study area. …”
Get full text
Get full text
Thesis -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis
Published 2017“…Results: By using the ID3 algorithm, it is possible to consider the relationship among variables and to identify the most informative variables for predicting the classification of the instance. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis -
14
Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis
Published 2020“…Several predictor variables included in this study were: seven demographics variables (i.e., age, gender, race, residence, marital, occupation and education) and twenty variables on the perception of ECV use. …”
Get full text
Get full text
Get full text
Article -
15
Development of an effective clustering algorithm for older fallers
Published 2022“…Using feature extraction with the t-SNE and the K-means clustering algorithm, subjects were clustered into low, intermediate A, intermediate B and high fall risk groups which corresponded with fall occurrence of 13%, 19%, 21% and 31% respectively. …”
Get full text
Get full text
Article -
16
The impact of the combat method on radiomics feature compensation and analysis of scanners from different manufacturers
Published 2024“…Conclusions: The Combat algorithm has reduced variability in radiomic features from different scanners. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
20
The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact
Published 2011“…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
Get full text
Get full text
Article
