Search Results - (( java implementation rsa algorithm ) OR ( using task ((using algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Data mining researchers often use classifiers to identify important classes of objects within a data repository.This research undertakes two main tasks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    RELMARK: An innovative algorithm for preprocessing of transactional business data by Mohd Shaharanee, Izwan Nizal, Mohd Jamil, Jastini, Hashim, Kamarul Faizal

    Published 2015
    “…The experiments using synthetic and real world data demonstrate the effectiveness of the algorithm.…”
    Get full text
    Get full text
    Article
  6. 6

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The mined frequent patterns are then used in generating association rules. …”
    Get full text
    Get full text
    Thesis
  7. 7

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    An efficient algorithm to discover large and frequent itemset in high dimensional data by Zulkurnain, Nurul Fariza

    Published 2019
    “…These approaches improved both memory and time requirement of the algorithms to finish mining tasks. Algorithm RARE searches the rowset lattice in breadth-first manner which resulted to a reduced itemset intersections compare to other state-of-the-art algorithms, CARPENTER and IsTa. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…The objective of this study is to suggest the potential classification model for talent forecasting throughout some experiments using SVM learning algorithm. In the experimental phase, we use employee’s performance data from selected organization to develop talent classification model which can be used to handle some tasks in talent management. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Improved BVBUC algorithm to discover closed itemsets in long biological datasets by Md Zaki, Fatimah Audah, Zulkurnain, Nurul Fariza

    Published 2019
    “…The task in mining closed frequent itemsets requires the algorithm to mine the frequent ones then determine its closure. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An extended ID3 decision tree algorithm for spatial data by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2011
    “…It is because spatial data mining algorithms have to consider not only objects of interest itself but also neighbours of the objects in order to extract useful and interesting patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…The goals of this study are to propose a suitable technique for preprocessing web log data of Sultanah Bahiyah Library online databases that can reduce the file size and to analyze the user's access pattern of the online databases using web usage mining. In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A data mining approach to construct graduates employability model in Malaysia by Sapaat, Myzatul Akmam, Mustapha, Aida, Ahmad, Johanna, Chamili, Khadijah, Muhamad, Rahamirzam

    Published 2011
    “…This study is to construct the Graduates Employability Model using classification task in data mining. To achieve it, we use data sourced from the Tracer Study, a web-based survey system from the Ministry of Higher Education, Malaysia (MOHE) for the year 2009. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    HYBRID: an efficient unifying process to mine frequent itemsets by Zulkurnain, Nurul Fariza, Shah, Ahmad

    Published 2018
    “…In this paper, an efficient hybrid algorithm was designed using a unifying process of the algorithms Improved Apriori and FP-Growth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…This huge amount of data can be a useful source of knowledge. Advanced mining processes are needed for this knowledge to be extracted, understood and used. …”
    Get full text
    Get full text
    Article
  19. 19

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…Deriving useful and interesting rules from a data mining system is an essential and important task. …”
    Get full text
    Get full text
    Get full text
    Article