Search Results - (( java implementation rsa algorithm ) OR ( knowledge contribution patterns algorithm ))
Search alternatives:
- contribution patterns »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
7
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
8
KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights
Published 2024“…Using clustering algorithms such as KMeans, KMeans with Principal Component Analysis (PCA), single linkage, complete linkage, DBScan, and DBScan in conjunction with PCA, we identify distinct customer segments based on loyalty patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…By applying this algorithm, the study achieves a high level of precision in predicting various types of detrimental behavior, enabling a better understanding of their underlying patterns. …”
Get full text
Get full text
Get full text
Article -
10
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
11
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
12
A spatial decision support system framework for optimization of cropping pattern and water resources allocation at pasargard plains, fars province, Iran
Published 2014“…A unit response matrix groundwater model was coupled with a modified version of Genetic Algorithm (GA) in order to optimize cropping patterns and water allocation decisions. …”
Get full text
Get full text
Thesis -
13
-
14
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
15
Transitioning from information sharing to knowledge services: unpacking the evolution of rural media within the context of media integration
Published 2023“…The adaptability of TikTok’s content curation algorithms caters to diverse age groups, contributing significantly to user satisfaction. …”
Get full text
Get full text
Get full text
Article -
16
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…STDP algorithm) has learning capability in memory recall. …”
Get full text
Get full text
Monograph -
17
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…There are many complex factors that contribute to the incidence of dengue, for example, climatic condition, environmental factors, socioeconomic status, socio-demographic variables, human behaviour, and health belief pattern among others. …”
Get full text
Get full text
Thesis -
18
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib
Published 2019“…Biological domain is one of the critical areas that always seek for useful knowledge and patterns observed through available methods, including data mining. …”
Get full text
Get full text
Thesis -
20
Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control
Published 2015“…Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
Get full text
Get full text
Get full text
Article
