Search Results - (( java implementation rsa algorithm ) OR ( programming process clustering algorithm ))
Search alternatives:
- java implementation »
- programming process »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
10
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
Fuzzy subtractive clustering (FSC) with exponential membership function for heart failure disease clustering
Published 2022“…Objective: Fuzzy clustering algorithm is a partition method used to assign objects from a data set to a cluster by marking the average location. …”
Get full text
Get full text
Article -
13
Learning analytic framework for students’ academic performance and critical learning pathways
Published 2024“…The resulting reduced dataset is then subjected to various clustering algorithms, including partition-based clustering (K-means), hierarchical clustering, and density-based clustering (DBSCAN). …”
Get full text
Get full text
Get full text
Article -
14
-
15
K Nearest Neighbor Joins And Mapreduce Process Enforcement For The Cluster Of Data Sets In Bigdata
Published 2018“…K Nearest Neighbor Joins (KNN join) are regarded as highly primitive and expensive operations in the data mining.The efficient use of KNN join has proven good results in finding the objects from two data sets prevailed in the huge databases.This has been achieved with the combination of K-Nearest Neighbor query and join operation to find the distinct objects from different data sets.MapReduce is a newly introduced program with the combination of Map Procedure method and Reduce Method widely used in BigData.MapReduce is enriched with parallel distributed algorithm to find the results on a cluster of data sets in BigData.In this paper,the combination of KNN join and MapReduce methods are utilized on the cluster of data sets in BigData for knowledge discovery.Exploring the pinpoint data from huge data sets stored in Big Data demands the distributed large scale data processing.The present research paper is focusing on generic steps for KNN joins exploration operations on MapReduce.The operations of KNN Join are targeted to perform the data partitioning and data pre-processing and necessary calculations.By utilizing the combination of KNN joins with MapReduce methods on BigData data sets will demonstrate a solution for complex computational analysis. …”
Get full text
Get full text
Get full text
Article -
16
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…Further research was done on the cluster formation of DGPV installation from the obtained results. …”
Get full text
Get full text
Thesis -
17
-
18
A Multi-Criteria Decision-Making Approach for Targeted Distribution of Smart Indonesia Card (KIP) Scholarships
Published 2025“…Second, the clustering process was conducted to group the priorities of prospective scholarship recipients using the K-Means and K-Medoids methods, as well as a combination of PCA+K-Means and PCA+K-Medoids. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Effective software fault localization based on complex network theory / Abubakar Zakari
Published 2019“…Fault localization plays a vital role in the debugging process, and it is also the most tedious and expensive activity in program debugging. …”
Get full text
Get full text
Get full text
Thesis
