Search Results - (( java implementation rsa algorithm ) OR ( using sparse clustering algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…One of the commonly used algorithm for bug clustering is K-means, which is considered a simplest unsupervised learning algorithm for clustering, yet it tends to produce smaller number of cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…One of the commonly used algorithm for bug clustering is K-means, which is considered a simplest unsupervised learning algorithm for clustering, yet it tends to produce smaller number of cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…In some cases, they are quite distant and sparseness. This uniqueness of Y-STR data has become problematic in partitioning the data using the existing partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification by Mohammed, Alhassan Afnan

    Published 2022
    “…Then, the feature selection process is performed using sparse fuzzy-c-means (FCM) for selecting significant features to classify medical data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An intelligent categorization tool for malay research articles by Mohd Norhisham Razali, Rayner Alfred, Chin, Kim On

    Published 2015
    “…Hence, by increasing the mapping percentage for the bilingual clusters, a more robust clustering algorithm can be developed for clustering bilingual documents. …”
    Get full text
    Get full text
    Research Report
  12. 12
  13. 13

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
    Get full text
    Get full text
    Article
  15. 15

    Communication and computational cost on parallel algorithm of PDE elliptic type by Alias, Norma

    Published 2009
    “…The parallel algorithms of 2-dimensional Partial Differential Equation (PDE) elliptic type for the prediction will be executed using distributed memory of heterogeneous cluster platform on LINUX-based environment. …”
    Get full text
    Get full text
    Book Section
  16. 16

    Clustering Based Affinity Propagation In Vanets : Taxonomy And Opportunity Of Research by Talib, Mohammed Saad, Hassan, Aslinda, Abal Abas, Zuraida, Hassan, Ali Abdul Hussian, Ali, Mohanad Faeq, Al-Araji, Zaid Jasim

    Published 2019
    “…The great challenging task in routing the messages in VANETs is related to the different velocities of the moving vehicles on the streets in addition to their sparse distribution. Clustering approach is broadly used to report this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
    Get full text
    Get full text
    Thesis