Search Results - (( java implementation rsa algorithm ) OR ( using _ ((missing algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.] by Hashad, Alaa Amin, Khaw, Khai Wah, Alnoor, Alhamzah, Chew, Xin Ying

    Published 2024
    “…The FP-Growth algorithm was found to be faster and more effective than the Apriori algorithm in extracting frequent item sets and generating association rules. …”
    Get full text
    Get full text
    Article
  6. 6

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…This problem inspires the idea to develop a prediction algorithm to predict the missing values in the dataset, where Support vector regression (SVR) has been proposed as a prediction method to predict missing values in several academic types of researches. …”
    Get full text
    Get full text
    Article
  7. 7

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Decision tree algorithms have the ability to deal with missing values or wrong data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Data Mining Analysis Of Chronic Kidney Disease (CKD) Level by Mohd Harizi, Muhammad Hafizam Afiq

    Published 2022
    “…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    DEVELOPMENT OF MULTI-VERSE OPTIMIZER IN ARTIFICIAL NEURAL NETWORK FOR ENHANCING THE IMPUTATION ACCURACY OF DAILY RAINFALL OBSERVATIONS by Lai, Wai Yan, Kuok, King Kuok, Chiu, Po Chan, Md. Rezaur, Rahman

    Published 2024
    “…MVOFNN is compared against the conventional Levenberg-Marquardt Feedforward Neural Network (LMFNN) and a promising data mining-based imputation approach, the Regularized Expectation Maximization (RegEM) algorithm, to assess its reliability and feasibility in reconstructing missing daily rainfall data. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Data Mining Approach To Classify Covid-19 Severity By Clinical Symptoms by Kanyan, Laura Jasmine Thomas

    Published 2021
    “…Data pre-processing was carried out to identify and remove outliers. Missing values were treated using filtering and imputation methods. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase by Che Mat @ Mohd Shukor, Zamzarina, Md Sap, Mohd Noor

    Published 2004
    “…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Sentiment analysis of customer review for Tina Arena Beauty by Amri, Nur Najwa Shahirah

    Published 2025
    “…Future work may involve expanding the dataset, integrating real-time feedback systems, and evaluating advanced algorithms to improve classification performance further. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20