Search Results - (( code application clustering algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- application clustering »
- code application »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…This study applies machine learning techniques using the WEKA analytical tool to explore, cluster and classify servicing code applications using a dataset gathered from multiple faculties, and campuses within the Faculty of Business and Management in a selected public university in Malaysia. …”
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
-
13
Neural network-based codebook search for image compression
Published 2000Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A proposed design for noise reduction algorithm in seismograph on high performance computing using F-K filter
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Thesis -
16
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
-
20
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…Streamlit.io application was chosen as the website to represent the coding. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
