Search Results - (( java implementation rsa algorithm ) OR ( using consequences mining algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using consequences »
- mining algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Prime-based method for interactive mining of frequent patterns
Published 2010“…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
Get full text
Get full text
Thesis -
7
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The mined frequent patterns are then used in generating association rules. …”
Get full text
Get full text
Thesis -
8
An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease
Published 2019“…This disease is not epidemic but it re-mains the single most common cause of death. This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. …”
Get full text
Get full text
Conference or Workshop Item -
9
An association rule mining approach in predicting flood areas
Published 2017“…The association rules mining technique will generate the best rules from the dataset by using Apriori algorithm which had been applied to find the frequent itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
10
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
Get full text
Get full text
Monograph -
11
Data mining reduction methods and performances of rules
Published 2009“…In data mining the accuracy of models are associated with the strength of the rules.However, most machine learning techniques produce a large number of rules.The consequence is with large number of rules generated,processing time is much longer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An Association Rule Mining Approach in Predicting Flood Areas
Published 2016“…The association rules mining technique will generate the best rules from the dataset by using Apriori algorithm which had been applied to find the frequent itemsets. …”
Get full text
Get full text
Get full text
Book Section -
13
A novel association rule mining approach using TID intermediate itemset
Published 2018Get full text
Get full text
Article -
14
-
15
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
16
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking about its behaviour. Consequently, any changes on these two variables cause the agent to use the PNDT to update the norms in complying with the domain's normative protocol. …”
Short Survey -
17
Intelligent mining of large-scale bio-data: bioinformatics applications
Published 2017“…Bioinformatics creates heuristic approaches and complex algorithms using artificial intelligence and information technology in order to solve biological problems. …”
Get full text
Get full text
Get full text
Article -
18
Modeling Teacher's Integrity Using Data Mining
Published 2010“…The dataset called teachers's integrity dataset contain 1500 records elaborates with 25 attributes including a target class were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Stock price monitoring system
Published 2024“…Consequently, Root Mean Squared Error (RMSE) and Mean Absolute Percentage Error (MAPE) are used to evaluate the performance of the prediction algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…After constructing predictive FDT, Weighted Fuzzy Production Rules (WFPRs) are extracted from predictive FDT, and then more significant WFPR’s are mined by using similarity-based fuzzy reasoning method. …”
Get full text
Get full text
Thesis
