Search Results - (( developing solution mining algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing solution »
- mining algorithm »
- java application »
- solution mining »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
Get full text
Get full text
Article -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
Get full text
Get full text
Thesis -
8
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
9
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
10
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Logistic regression methods for classification of imbalanced data sets
Published 2012“…This thesis aims to develop the simple and effective imbalanced classification algorithms by previously improving the algorithms performance of general classifiers i.e. …”
Get full text
Get full text
Thesis -
13
Improvement DACS3 Searching Performance using Local Search
Published 2009Get full text
Get full text
Conference or Workshop Item -
14
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
15
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
16
-
17
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009“…Name Entity Recognition (NER) is one of the main task needed to develop text mining systems in which it is used to identify and classify entities in the text into predefined categories such as the names of persons, organizations, locations, dates, times, quantities, monetary values, percentages, etc. …”
Get full text
Get full text
Conference or Workshop Item -
18
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
19
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction
Published 2024“…Therefore, a fuzzy model based on machine learning and data mining is a vital solution. In this study, ten supervised machine learning algorithms namely the J48, Logistic, NaiveBayes Updateable, RandomTree, BayesNet, AdaBoostM1, Random Forest, Multilayer Perceptron, Bagging and Stacking are applied for a simulated diabetes fuzzy dataset, verified by medical experts. …”
Get full text
Get full text
Get full text
Article
