Search Results - (( java implementation rsa algorithm ) OR ( using test mining algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- mining algorithm »
- rsa algorithm »
- test mining »
- using test »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Genetic Algorithm for Web Data Mining
Published 2001“…Eight search engines used for this study were tested with two groups of words. …”
Get full text
Get full text
Project Paper Report -
7
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…The main purpose of this research to test whether Genetic Algorithm can use to predict future sales and be able generates the graph. …”
Get full text
Get full text
Thesis -
8
Discovering association rules for mining images datasets: a proposal
Published 2005“…A synthetic image set containing geometric shapes will generate to test the initial algorithm implementation. The experiments results show that there is promise in image mining based on content. …”
Get full text
Get full text
Conference or Workshop Item -
9
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…E-mail is used for communication between strangers and friends. …”
Get full text
Get full text
Research Reports -
10
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
11
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The mined frequent patterns are then used in generating association rules. …”
Get full text
Get full text
Thesis -
12
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
Get full text
Get full text
Thesis -
13
Sequential pattern mining using PrefixSpan with pseudoprojection and separator database
Published 2008“…Sequential pattern mining is a new branch of data mining science that solves inter-transaction pattern mining problems. …”
Get full text
Get full text
Conference or Workshop Item -
14
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
Published 2019“…The task in mining closed frequent itemsets requires the algorithm to mine the frequent ones then determine its closure. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
17
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
Get full text
Get full text
Thesis -
18
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
19
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
20
Towards scalable algorithm for closed itemset mining in high-dimensional data
Published 2017“…Unlike many well-known algorithms, BFF traverses the search tree in breadth-first manner resulted to a minimum use of memory and less running time. …”
Get full text
Get full text
Get full text
Get full text
Article
