Search Results - (( java implementation rsa algorithm ) OR ( knowledge usage data algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- knowledge usage »
- data algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article -
7
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…With the abundant of knowledge accessible via Internet and the likes, many have ventured into using that knowledge in order to understand deeply on how the available knowledge affected the whole world directly or indirectly. …”
Get full text
Get full text
Thesis -
8
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…In a world of connectivity empowered by the advancement of the Internet of Things (IoT), an infinite number of data streams have emerged. Thus, data stream clustering is crucial for extracting hidden knowledge and data mining. …”
Article -
9
Web usage mining: A review of recent works
Published 2015“…Web mining is the application of data mining on web data and web usage mining is an important component of web mining. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
A new classification model for online predicting users' future movements
Published 2008“…We can exploit Web Usage Mining for Knowledge extracting based on user behavior during the web navigation. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase
Published 2004“…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
BVAGQ-AR for Fragmented Database Replication Management
Published 2021“…Although we have been packed with data, we still have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
Get full text
Get full text
Get full text
Article -
14
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…However, in recent years, with widely available, low-cost technology, the amount of various data grows rapidly. The problem is although we are packed with data, but we have lacked of knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
15
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. …”
Get full text
Get full text
Get full text
Article -
16
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Thus, resulting in the efficiency of the novel AR-IoT remote monitoring algorithm. This research contributes to existing knowledge of AR-IoT onto the growing area of research scopes by exploring more usage of AR and IoT for remote manufacturing monitoring.…”
Get full text
Get full text
Thesis -
17
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…Analysis of simultaneous clustering of gene expression with biological knowledge has now become an importanttechnique and standard practice to present a proper interpretation of the data and its underlying biology. …”
Get full text
Get full text
Article -
18
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
19
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…By defining the data, machines (or computers) will be able to create information and later on transform it into knowledge. …”
Get full text
Get full text
Thesis -
20
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…Recently, many researchers have focused on data stream processing as an efficient method for extracting knowledge from big data. …”
Get full text
Get full text
Article
