Search Results - (( java implementation rsa algorithm ) OR ( using same mining algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- mining algorithm »
- rsa algorithm »
- same mining »
- using same »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
7
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The mined frequent patterns are then used in generating association rules. …”
Get full text
Get full text
Thesis -
8
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
9
Data mining approach to herbs classification
Published 2018Get full text
Get full text
Get full text
Article -
10
Identifying Relationship between Hearing loss Symptoms and Pure-tone Audiometry Thresholds with FP-Growth Algorithm
Published 2013“…Interesting relationships were discovered and the results were compared to earlier findings using the same method on a sample datasets of 50 hearing loss patients with 0.1 as the minimum support and 0.7 confidence thresholdsfor the association rule mining. …”
Get full text
Get full text
Get full text
Article -
11
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
12
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
Published 2018“…Text document (TD) clustering is a new trend in text mining in which the TDs are separated into several coherent clusters, where documents in the same cluster are similar. …”
Get full text
Get full text
Thesis -
13
Comparison of expectation maximization and K-means clustering algorithms with ensemble classifier model
Published 2018“…EM and K-means clustering algorithms are used to cluster the multi-class classification attribute according to its relevance criteria and afterward, the clustered attributes are classified using an ensemble random forest classifier model. …”
Get full text
Get full text
Get full text
Article -
14
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Document clustering is an implementation of data mining task. By using similarity measurement of documents‟ characteristic, they can be clustered based on the same category or topic. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…The K-means algorithm is a famous and fast technique in non-hierarchical cluster algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis
