Search Results - (( data continuation patterns algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- continuation patterns »
- data continuation »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Parallel implementation on improved error signal of backpropagation algorithm
Published 2001“…Experiments for testing the recognition rates involves the twenty-six trained sample data with perfect pattern and untrained sample data with 10% corrupted pattern. …”
Get full text
Get full text
Thesis -
7
Advanced flood prediction at forest with rainfall data using various machine learning algorithms
Published 2024“…The aim is to classify and predict floods in advance with rain data patterns of India using spatio-temporal logic. …”
Get full text
Get full text
Conference or Workshop Item -
8
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
PREDICTING THE PRICE OF COTTON USING RNN AND LSTM
Published 2020“…The data will then be separated into training set and testing set and will be feed to the machine learning algorithm to find the pattern and try to do prediction. …”
Get full text
Get full text
Final Year Project -
11
Pemahaman guru matematik Tahun Enam tentang pembahagian nombor bulat / Hoi Sim Min
Published 2018“…This study also found that teachers have four general patterns of thought and an algorithm to solve the problem of division of whole numbers, that is, the general pattern of thought of partition, measurement, repeated subtraction, the inverse of multiplication , and long division algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
Get full text
Get full text
Article -
13
Using Pattern Search Methods for Minimizing Clustering Problems
Published 2010“…Clustering is one of an interesting data mining topics that can be applied in many fields. …”
Get full text
Article -
14
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…As for EMG feature selection, the proposed algorithms are evaluated using the EMG data acquired from the publicly access EMG database. …”
Get full text
Get full text
Get full text
Article -
15
Machining surface roughness monitoring using acoustic emission method
Published 2010“…Based on experiment data, the pattern of AE parameter with Fast Fourier Transform, FFT can be concluded. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…Looking ahead, future works may explore refining the SVM model and incorporating additional features for improved accuracy, and the ongoing iterative process involves continuous validation and adaptation of the model to evolving data patterns and emerging challenges in pandemic management. …”
Get full text
Get full text
Thesis -
17
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…However, the current DBN.NIDS model is still ineffective for large-scale real-world data due to some issues: 1) the pre-training of the DBN algorithm includes simple feature learning which does not work very well to extract important features from the attack data, 2) the classification task of the DBN algorithm is a poor detection for imbalanced class dataset and 3) the design of the DBN model could be weak and need to be continuously updated by modern definitions of abnormal to detect recent attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
