Search Results - (( developing acquisition encryption algorithm ) OR ( java visualization mining algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar by Baba, Mohd Dani, Ghodgaonkar, Deepak Kumar

    Published 2003
    “…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
    Get full text
    Get full text
    Research Reports
  3. 3
  4. 4

    Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications by Ayob A., Salim Reza S.M., Hussain A., Saad M.H.M., Amin N.

    Published 2023
    “…This paper analyzes the complete structure of a smart grid system, implementation of technologies such as Supervisory Control and Data Acquisition (SCADA) and smart metering, as well as identifies the potential cyberthreats. …”
    Article