Search Results - (( java implementation rsa algorithm ) OR ( using services mining algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING by ABDUL RAHIM, NURALIAH

    Published 2020
    “…Hence, this paper contribute to justify by the basic concepts of data mining, described the selected types and models of algorithms, and the process of data mining by using R Tools.…”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
    Get full text
    Get full text
    Article
  8. 8

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, Khan

    Published 2011
    “…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
    Get full text
    Get full text
    Citation Index Journal
  9. 9

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
    Get full text
    Get full text
    Citation Index Journal
  10. 10
  11. 11
  12. 12

    A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2009
    “…The approach is based on the using longest common subsequence algorithm to classify current user activities to predict user next movement. …”
    Get full text
    Get full text
    Article
  13. 13

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    WebPUM : a web-based recommendation system to predict user future movements. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2010
    “…Furthermore, longest common subsequence algorithm is used for classifying current user activities to predict user next movement. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Sequential pattern mining on library transaction data by Sitanggang, Imas Sukaesih, Husin, Nor Azura, Agustina, Anita, Mahmoodian, Naghmeh

    Published 2010
    “…Application of data mining techniques in library data results interesting and useful patterns that can be used to improve services in university libraries. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Mining Web usage using FRS by Omar, Rosli, Abdullah, Zainatul Shima

    Published 2018
    “…A mining algorithm is introduced using the approach of vertical database. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Web usage mining: A review of recent works by Omar, Rosli, Md Tap, Abu Osman, Abdullah, Zainatul Shima

    Published 2015
    “…Knowledge obtained from web usage mining can be used to enhance web design, introduce personalization service and facilitate more effective browsing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
    Get full text
    Get full text
    Research Reports