Search Results - (( data processing ((rsa algorithm) OR (tree algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- tree algorithm »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
6
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
7
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…First, Pan and Tompkins’s algorithm was applied to perform the ECG signal processing. …”
Get full text
Get full text
Get full text
Article -
11
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
12
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
13
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
14
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
15
Individual-tree segmentation and extraction based on LiDAR point cloud data
Published 2024“…Utilizing LiDAR point cloud data and ground-measured data from 30 plots, we examined the sensitivity of individual tree segmentation to key parameters by varying the grid values of the point cloud distance discriminant clustering algorithm and adjusting the canopy height resolution (CHR) of the watershed algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. …”
Get full text
Get full text
Thesis -
17
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…However, the most difficulties are to develop a method to detect, extract and count trees automatically from the image. This study aimed to develop the automatic oil palm tree counting using remote sensed data and two different algorithms at Felda Pasoh. …”
Get full text
Get full text
Thesis -
18
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
19
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…ID3 has the most advantages among the three algorithms, especially in processing time, as it builds the fastest tree with short depth. …”
Get full text
Get full text
Thesis -
20
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…The resultant tree is used to modify the considered LSBs. After the accomplishment of the data embedding process, the final image, which is called stego image, is derived. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
