Search Results - (( java implementation rsa algorithm ) OR ( knowledge making using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- knowledge making »
- using algorithm »
- rsa algorithm »
- making using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…Each decision makers have their own knowledge and opinion to make an assessment. This will increase the complexity in computation. …”
Get full text
Get full text
Thesis -
7
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…Thus, the objective of this paper is to propose a reliable fuzzy clustering algorithm using z-numbers. This model will demonstrate the capability to handle the knowledge of human being and uncertain information in evaluating the wellness of chronic kidney disease (CKD) patients. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…For instance, in case of forex, the online algorithm is presented daily exchange rates. The algorithm does not have knowledge about future exchange rates, and has to make an irreversible conversion decision on each day. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019“…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
11
A hybrid approach to improve recommendation system in E-tourism
Published 2024conference output::conference proceedings::conference paper -
12
AGENT MEETING SCHEDULER
Published 2011“…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
Get full text
Get full text
Final Year Project -
13
Cryptanalysis in cryptographic algorithm design
Published 2006“…Therefore, a cryptographic algorithm has to endure cryptanalysis to ensure that it is safe for private or public use. …”
Get full text
Conference or Workshop Item -
14
Numerical analysis
Published 2008“…Much of this knowledge is in the form of algorithms for solving certain standard and widely used problems. …”
Get full text
Get full text
Get full text
Article -
15
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
16
A Fusion-Based Framework For Explainable Suicide Attempt Prediction
Published 2024“…Therefore, this study presents a fusion-based framework for explainable suicide attempt prediction using explainable data-driven and knowledge-driven approaches to classify and explain individuals with suicide attempts to support decision-making by medical experts. …”
Get full text
Get full text
Thesis -
17
Decision tree as knowledge management tool in image classification
Published 2008“…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…A fuzzy system is a rule-based system that uses human expert's knowledge which holds the truth or false values to make a particular decision. …”
Get full text
Get full text
Thesis -
20
Optimal cost benefit of the EToU electricity tariff for a manufacturing operation by using optimization algorithm
Published 2021“…Since the electricity market are getting more attention due to the electricity demand, there are many options of tariff can be chosen thus making it harder for consumers to make decisions. …”
Get full text
Get full text
Get full text
Article
