Search Results - (( data interaction patterns algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- interaction patterns »
- data interaction »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Prime-based method for interactive mining of frequent patterns
Published 2010“…Thus far, a few efficient interactive mining algorithms have been proposed. However, their runtime do not fulfill the need of short runtime in real time applications especially where data is sparse and proper frequent patterns are mined with very low values of minsup. …”
Get full text
Get full text
Thesis -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…Data visualization is used to analyse the patterns and trends of data, including budget distributions, business analytics and so forth in a form of diagrams, charts and so on. …”
Get full text
Get full text
Thesis -
8
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
9
Comparative study of machine learning algorithms in data classification
Published 2025“…In many different fields, data mining, the process of identifying significant patterns in historical data, is essential to decision-making. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Using Pattern Matching technique for feature recognition of STEP file
Published 2008Get full text
Learning Object -
11
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2023“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Article -
13
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
14
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2015“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…This will allow the investigators to detect the data remnants and identify their patterns. The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
17
Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms
Published 2023“…In this paper, we use an existing data set from previous research, which has 100 records of data, and manipulate the data by applying three machine learning algorithms for implementing classification and regression tasks. …”
Get full text
Get full text
Article -
18
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Clustering defines or organizes a group of patterns or objects into clusters, allows high-dimensional data to be presented in an apprehensive fashion to humans. …”
Get full text
Get full text
Article -
19
Coherence Function of Wind and Waves ofMetocean Data
Published 2011“…This is to ensure that we are able to distinguish the environmental condition for each set of metocean data as well as the seasonal pattern. The measured data is analyzed using the assistance of mathematical software, PASW 18 in order to compute the complex algorithm involved. …”
Get full text
Get full text
Final Year Project -
20
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Clustering defines or organizes a group of patterns or objects into clusters, allows high-dimensional data to be presented in an apprehensive fashion to humans. …”
Get full text
Get full text
Get full text
Get full text
Article
