Search Results - (( developing solution rsa algorithm ) OR ( java visualization mining algorithm ))
Search alternatives:
- visualization mining »
- developing solution »
- java visualization »
- mining algorithm »
- rsa algorithm »
- solution rsa »
-
1
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
2
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
3
-
4
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
5
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The aim of this thesis is to develop a fair and efficient packet scheduling and adaptive bandwidth allocation algorithms to support QoS for a diverse service class for A-MSDU aggregation in IEEE 802.1 In network. …”
Get full text
Get full text
Thesis -
7
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…Therefore, security is improved as it is difficult to detect watermark (imperceptibility) when combined with the developed PRNG. …”
Get full text
Get full text
Get full text
Thesis
