Search Results - (( pattern validation mining algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- validation mining »
- mining algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…The proposed method is based on comparing two algorithms: Apriori and Frequent Pattern Growth (FP- Growth). …”
Get full text
Get full text
Article -
6
Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique)
Published 2016“…Data mining is the process of mining the hidden patterns from the huge data. …”
Get full text
Get full text
Monograph -
7
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
8
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
9
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Article -
11
Sequential pattern mining using personalized minimum support threshold with minimum items
Published 2011“…One of the challenges of Sequential Pattern Mining is finding frequent sequential patterns in a huge click stream data (web logs) since the data has the issue of a very low support distribution.By applying a Frequent Pattern Discovery technique, a sequence is considered as frequent if it occurs more than the minimum support (min sup) threshold value.The conventional method of assuming one min sup value is valid for all levels of k-sequence, may have an impact on the overall results or pattern generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…Classification analysis was initially performed on all seven classifier’s algorithms at 10-fold dross validation mode. At phase one, Stroke and Curve are added into the dataset and classified respectively. …”
Get full text
Get full text
Monograph -
13
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
14
Data Classification and Its Application in Credit Card Approval
Published 2004“…Sample credit card approval dataset is used to demonstrate the functionality of a data mining solution prototype, which includes the typical tasks of a decision tree induction process: data selection, data preprocessing, decision tree induction, tree pruning, rules generation and validation. …”
Get full text
Get full text
Final Year Project -
15
Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining
Published 2023“…First, this study combines SPM with Sentence Scoring method as feature-based approach and Bellman-Ford algorithm as graph-based to validate the performance of SPM. …”
Get full text
Get full text
Get full text
Thesis -
16
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
18
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
Get full text
Get full text
Undergraduates Project Papers -
19
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…Meanwhile, for improving the efciency of training and predicting, Pearson Correlation analysis, standard deviation, and a new adaptive K-means are used to select attributes and make fuzzy interval decisions. The proposed algorithm was trained, validated, and tested on the NSL-KDD (National security lab–knowledge discovery and data mining) dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A Data Mining Approach to Enhancing Birth and Death Registration Processes
Published 2025“…Using k-means clustering, apriori association rules, and c5 decision trees, this research identifies key patterns influencing late registrations. The optimal number of clusters of clusters for birth and death data is determined as three using elbow and silhouette validation methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis
