Search Results - (( java implementation rsa algorithm ) OR ( program extraction mining algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. The result of this project are expected to be a comparison of the used methods that will give an indication how well evolutionary programming can perform relative to conventional method and how good the results of the data mining process.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…These tools are known as Data Mining (DM). One aims of DM is to discover decision rules for extracting meaningful knowledge. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Enhanced Hopfield Neural Networks With Artificial Immune System Algorithm For Satisfiability Logic Programming by Mansor, Mohd. Asyraf

    Published 2017
    “…A hybrid network called HNN-3SATAIS is proposed by assimilating the Hopfield neural network with the enhanced artificial immune system (AIS) algorithm as a training tool in doing 3-Satisfiability logic programming.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Extracting Tweets Using R in The Context of Ethical Issues by Mohamed Najid, Mohamad Hafizuddin, Zulkifli, Zahidah, Othman, Roslina, Rokis, Rohaiza

    Published 2021
    “…The analysis was carried out with a simple algorithm written in R Programming. 45 keywords based on Ibn Khaldun’s thoughts were constructed as the hashtag to retrieve data from Twitter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan by Mohd Hanis, Rani, Abdullah, Embong

    Published 2013
    “…The paper focuses on prediction of student learning performance in object oriented programming course using data mining technique based on a dataset obtained from Kolej Poly-Tech Mara (KPTM), Kuantan. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop by Kerdprasop, Nittaya, Kerdprasop, Kittisak

    Published 2014
    “…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…This merit is provided by balancing the exploitation of solution structure and exploration of its appropriate weighting factors through use of a robust and efficient optimization algorithm in learning process of GEP approach. To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
    Get full text
    Get full text
    Get full text
    Thesis