Search Results - (( java implementation rsa algorithm ) OR ( using rough mining algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- mining algorithm »
- rsa algorithm »
- rough mining »
- using rough »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
7
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
10
Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree
Published 2010“…This paper addresses these issues by intelligently divulging the knowledge hidden in the relay recorded event report using a data-mining strategy based on rough set theory and a rule-quality measure under supervised learning to discover the relay decision algorithm and association rule. …”
Get full text
Get full text
Get full text
Article -
11
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
12
Rough set-based text mining from a large data repository of experts� diagnoses for power systems
Published 2018“…The algorithms of rough set and statistical t-test are used to distinguish whether a subset can be classified in the object set or not. …”
Get full text
Get full text
Article -
13
Rough set-based text mining from a large data repository of experts� diagnoses for power systems
Published 2018“…The algorithms of rough set and statistical t-test are used to distinguish whether a subset can be classified in the object set or not. …”
Get full text
Get full text
Article -
14
Satisfiable Integer Programming Algorithm On Distributed Inter Process Communication (SIP-DIPC)
Published 2019“…Data Analytics is a superset to Data Mining. Data mining algorithm is getting popular support in recent development of Big Data. …”
Get full text
Get full text
Get full text
Article -
15
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…Therefore the search for the best rules must be performed because it is not possible to determine the quality of all rules generated from the information systems. In rough set approach to data mining, the set of interesting rules are determined using a notion of reduct. …”
Get full text
Get full text
Thesis -
16
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
17
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
Get full text
Get full text
Get full text
Article -
18
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
20
A Rough Set-Based Approach for Identifying and Replacing Missing Concepts in Incomplete Sentences in Computer Domain Texts
Published 2026thesis::master thesis
