Search Results - (( java implementation mining algorithm ) OR ( data integration encryption algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- data integration »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. …”
Article -
5
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
7
Reduction-by-percentage compression technique for reducing sizes of plaintext prior to encryption algorithm
Published 2022“…With smaller sizes, the encryption algorithm would process inputs with smaller sizes, and these could potentially make the encryption algorithm be executed in cheaper computational and storage capacity costs.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
9
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
10
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
11
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
12
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…The doctor is a server side who's the administrator and responsible to decrypt and manage the data. This study is to deliver the approach of confidentiality, integrity and trust to the patient's medical data.…”
Get full text
Get full text
Thesis -
13
-
14
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
Get full text
Get full text
Thesis -
17
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. The consequent integration of these algorithms in this study was therefore grounded in the scientific rationale of establishing a strong and resilient cypher technique. …”
Get full text
Get full text
Get full text
Article -
18
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
19
-
20
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013“…Cryptography is the science of information security that includes symmetric encryption and asymmetric encryption which used to avoid the tampering attempts and guarantee the data integrity. …”
Get full text
Get full text
Get full text
Proceeding Paper
