Search Results - (( loading classification clustering algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- classification clustering »
- loading classification »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…A lot of efforts have been made to investigate methodologies to form optimal efficiency in determining typical load profiles (TLPs), derived from various clustering and classification techniques. …”
Get full text
Get full text
Thesis -
6
An application of a novel technique for assessing the operating performance of existing cooling systems on a university campus
Published 2018“…Two contributions in this work are: (1) the prediction of a model by using Adaptive Neuro-Fuzzy Inference System (ANFIS)-based Fuzzy Clustering Subtractive (FCS), and (2) the classification and optimization of the predicted models by using an Accelerated Particle Swarm Optimization (APSO) algorithm. …”
Get full text
Get full text
Article -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
-
9
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…The main objective of this study is to identify the demand patterns and optimizing the lecturer’s contribution by maintaining a class sizes of maximum number of students in each class is 30 and a teaching load of up to 20 credit hours per lecturer. An Expectation-Maximization (EM) clustering model revealed five distinct clusters representing varied course demand concentrations and faculty distributions, with Cluster 1 (30%) showing the highest cumulative demand across university courses. …”
Get full text
Get full text
Get full text
Article -
10
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…A new method to initialize the clustering centers was also proposed to improve the results of segmentation. …”
Get full text
Get full text
Book Section -
11
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…A new method to initialize the clustering centers was also proposed to improve the results of segmentation. …”
Get full text
Get full text
Thesis
