Search Results - (( java implementation rsa algorithm ) OR ( using continuous mining algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
    Get full text
    Get full text
    Article
  8. 8

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues by Muhammad, Fajar, Tri Basuki, Kurniawan, Edi Surya, Negara Harahap

    Published 2023
    “…In this study, the author will continue the research from another researcher by adding a feature selection process, such as two algorithms from the filtered method, chi-square, and information gain, and one algorithm from the wrapped method, which is Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…The third process is the parsing that is operated by a text mining algorithm. The last part is the storage that is managed by Monitor Agent. …”
    Article
  13. 13

    A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition by Ayu, Media Anugerah, Ismail, Siti Aisyah, Abdul Matin, Ahmad Faridi, Mantoro, Teddy

    Published 2012
    “…Our earlier research has shown that data from mobile-phone embedded accelerometer can be used for activity recognition purpose [1]. As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks by Farah Liyana, Azizan, Saratha, Sathasivam, Majid Khan, Majahar Ali, Nurshazneem, Roslan, Caicai, Feng

    Published 2023
    “…First, we included fuzzy logic into the system to make the bipolar structure change to continuous while keeping its logic structure. Then, a Genetic Algorithm is employed to optimise the solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Prediction of breast cancer relapse time in continuous scale based on type-2 TSK fuzzy model by Mahmoudian, Sayed Hamid

    Published 2010
    “…In addition, K-fold Cross Validation, B632 and B632+ methods have been used for error estimation. In the first objective of the thesis, a lemma has been proven and a new hybrid algorithm based on Fuzzy Association Rule Mining has been proposed to gather some selected genes and generate fuzzy rules for classification. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Using Pattern Search Methods for Minimizing Clustering Problems by Shabanzadeh, Parvaneh, Abu Hassan, Malik, Leong, Wah June, Mohagheghtabar, Maryam

    Published 2010
    “…Clustering is one of an interesting data mining topics that can be applied in many fields. …”
    Get full text
    Article
  19. 19

    Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs) by Baashar Y., Alkawsi G., Mustafa A., Alkahtani A.A., Alsariera Y.A., Ali A.Q., Hashim W., Tiong S.K.

    Published 2023
    “…One of these advances is the use of analytics and data mining to predict student academic accomplishment and performance. …”
    Article
  20. 20

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Collectively, discrete values are finite intervals in a continuous spectrum of values and well known to play important roles in data mining and knowledge discovery. …”
    Get full text
    Get full text
    Conference or Workshop Item