Search Results - (( java implementation rsa algorithm ) OR ( using composition mining algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- composition mining »
- using composition »
- mining algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
8
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
Get full text
Get full text
Thesis -
9
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
Get full text
Get full text
Get full text
Thesis -
10
Evaluation of Formation Damage from Transient Pressure Analysis: Unsteady State Skin Factor
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. …”
Get full text
Get full text
Get full text
Article -
12
