Search Results - (( java application rsa algorithm ) OR ( based interactive tree algorithm ))
Search alternatives:
- java application »
- interactive tree »
- application rsa »
- tree algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Prime-based method for interactive mining of frequent patterns
Published 2010“…The PC-tree is a well-organized tree structure, which is systematically built based on descendant making introduced in this study. …”
Get full text
Get full text
Thesis -
6
-
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…This algorithm provides a decision tree output to represent the knowledge model, enabled a faster classification of intra-urban classes, and disabled the subjectivities which are related to the interaction of the analyst. …”
Get full text
Conference or Workshop Item -
9
Detection of eye movements based on EEG signals and the SAX algorithm
Published 2018Get full text
Get full text
Conference or Workshop Item -
10
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
11
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
12
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…CGTreeGenerator compacted the XML tree by eliminating irrelevant nodes based on CLCA notion, which produced Compact Global Tree (CGTree). …”
Get full text
Get full text
Thesis -
13
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
14
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
Get full text
Get full text
Get full text
Thesis -
15
Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region
Published 2014“…Using Genetic Algorithm, this paper presents a modelling method to generate novel logical-based features from DNA sequences enriched with H3K4mel histone signatures. …”
Get full text
Get full text
Get full text
Article -
16
Interactive blood vessel segmentation from retinal fundus image based on canny edge detector
Published 2021“…After that, the edge detection techniques, which are based on the Canny algorithm, will be applied. The vessels will be selected interactively on the developed graphical user interface (GUI). …”
Get full text
Get full text
Get full text
Article -
17
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
18
A study on component-based technology for development of complex bioinformatics software
Published 2004“…From the enriched GO tree, the BTreeBicluster algorithm is applied during the clustering process. …”
Get full text
Get full text
Monograph -
19
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…Finally, we made a table to compare all the algorithms in each category against criteria such as: user interaction, angiography types, dimensionality, enhancement method, full coronary artery output, whole tree output, and 3D reconstruction ability.…”
Get full text
Get full text
Conference or Workshop Item -
20
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
Published 2018“…The behaviors and interactions among the stocks in Bursa Malaysia are then determined by using the Forest of all possible minimum spanning trees. …”
Get full text
Get full text
Get full text
Get full text
Thesis
