Search Results - (( java implementation rsa algorithm ) OR ( basic data extraction algorithm ))
Search alternatives:
- extraction algorithm »
- java implementation »
- implementation rsa »
- rsa algorithm »
- basic data »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Direct approach for mining association rules from structured XML data
Published 2012“…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
Get full text
Get full text
Thesis -
8
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
9
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
10
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The purpose of the project is basically to extract and identify each object elements in an image picture. …”
Get full text
Get full text
Thesis -
11
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware part is developed for abdominal Electrocardiography (AECG) data acquisition system. Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
Get full text
Get full text
Get full text
Article -
12
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…From each successful contour segmentation, four basic morphological features are extracted to create the Harumanis data set. …”
Get full text
Get full text
Thesis -
13
“Analysis of EEG Recordings During Grasp and Lift (GAL) Trials
Published 2018“…Specifically for this project, we will focus on the process of analysing the EEG signal that includes the extraction of data, filtering data, applying feature extraction and performing classification of the EEG signal. …”
Get full text
Get full text
Final Year Project -
14
DSC766: Text Analytics / College of Computing, Informatics and Mathematics
Published 2020“…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
Get full text
Get full text
Get full text
Teaching Resource -
15
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…Hence, this paper contribute to justify by the basic concepts of data mining, described the selected types and models of algorithms, and the process of data mining by using R Tools.…”
Get full text
Get full text
Final Year Project -
16
-
17
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…These tools are known as Data Mining (DM). One aims of DM is to discover decision rules for extracting meaningful knowledge. …”
Get full text
Get full text
Thesis -
18
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The software used for this prototype is Visual Basic 6.0. More over, the information retrieval makes the retrieval of document or collection of data in the storage media more efficient, effective, relevant, faster and more reliable than before. …”
Get full text
Get full text
Research Reports -
19
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The software used for this prototype is Visual Basic6.0. More over, the information retrieval makes the retrieval of document or collection of data in the storage media more efficient, effective, relevant, faster and more reliable than before. …”
Get full text
Get full text
Research Reports -
20
Google the earth: what's next?
Published 2010“…Considering the exponential growth of data volumes driven by the rapid progress in sensor and computer technologies in recent years, the future of remotely sensed data should ideally be in automated data processing, development of robust and transferable algorithms and processing chains that require little or no human intervention. …”
Get full text
Get full text
Get full text
Inaugural Lecture
