Search Results - (( java implementation rsa algorithm ) OR ( using next mining algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An efficient algorithm to discover large and frequent itemset in high dimensional data by Zulkurnain, Nurul Fariza

    Published 2019
    “…For this reason, this research has proposed two new algorithms; RARE and RARE II, which mine colossal closed itemsets. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…The objectives of this research are data mining are used to extract useful data from sales and product. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2009
    “…The approach is based on the using longest common subsequence algorithm to classify current user activities to predict user next movement. …”
    Get full text
    Get full text
    Article
  10. 10

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
    Get full text
    Get full text
    Thesis
  11. 11

    WebPUM : a web-based recommendation system to predict user future movements. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2010
    “…Furthermore, longest common subsequence algorithm is used for classifying current user activities to predict user next movement. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…The developed logic mining will be used to analyze the Alzheimer's Disease Neuroimaging Initiative dataset.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Predicting next page access by Markov models and association rules on web log data by Chimphlee, S., Salim, N., B. Ngadiman, M. S., Chimphlee, W., Srinoy, S.

    Published 2006
    “…Mining user patterns of log file can provide significant and useful informative knowledge. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Modeling Teacher's Integrity Using Data Mining by Mohd Latifi, Abdul Ghani

    Published 2010
    “…The dataset called teachers's integrity dataset contain 1500 records elaborates with 25 attributes including a target class were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…Next, machine learning (ML) methods (i.e. decision tree, gradient boosting, random forest, stacking, and neural network) were used to classify FLS of soybean. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…Data mining is the sixth step in which software of Orange is used as the tool. …”
    Get full text
    Get full text
    Monograph