Search Results - (( java implementation rsa algorithm ) OR ( pattern optimization mining algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry by Ma, Yuaner, Jabar, Juhaini, Abdul Aziz, Nor Azah

    Published 2023
    “…The integrated GSH-DM model then applies the Gaussian Seahorse Optimization algorithm to optimize the data mining process, enhancing the accuracy and efficiency of pattern discovery. the GSH-DM model, this study aims to uncover hidden patterns, relationships, and predictive models that can guide decision-making and strategy development for cross-border business cooperation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability by Romli, Nurul Atiqah

    Published 2024
    “…The proposed logic mining model is able to retrieve best induced logic that represents the optimal patterns of the dataset. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…Pattern Discovering and Patern Analysis. Main resources, server log files become a set of raw data where it's must go through with all the Web usage mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E-Learning portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Article
  14. 14

    Using Pattern Search Methods for Minimizing Clustering Problems by Shabanzadeh, Parvaneh, Abu Hassan, Malik, Leong, Wah June, Mohagheghtabar, Maryam

    Published 2010
    “…Recently, the problem of cluster analysis is formulated as a problem of nonsmooth, nonconvex optimization,and an algorithm for solving the cluster analysis problem based on nonsmooth optimization techniques is developed. …”
    Get full text
    Article
  15. 15

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Even the smart people are unable to report an email as a spam when the spammer tries to defraud them. The aim of data mining is to search and find undetermined patterns in huge databases. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Uncovering patterns in online database usage at UiTM Negeri Sembilan: a data mining approach/ Mohd Aizat Abd Halim and Safawi Abdul Rahman by Abd Halim, Mohd Aizat, Abdul Rahman, Safawi

    Published 2024
    “…This study investigates online database usage patterns at Universiti Teknologi MARA (UiTM) Negeri Sembilan through a data mining approach, specifically utilizing association rule mining and the Apriori algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm by Alzeini, Haytham I M, Hameed, Shihab A., Habaebi, Mohamed Hadi

    Published 2013
    “…Keywords— OLAP, heterogeneous computing, Rabin-Karp, data mining, pattern recognition.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20