Search Results - (( processes solution mining algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- processes solution »
- mining algorithm »
- java application »
- solution mining »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
Get full text
Get full text
Get full text
Thesis -
6
A numerical method for frequent pattern mining
Published 2009“…Frequent pattern mining is one of the active research themes in data mining. …”
Get full text
Get full text
Article -
7
-
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project demonstrates how data mining can address the need of business intelligence in the process of decision-making. …”
Get full text
Get full text
Final Year Project -
10
Towards scalable algorithm for closed itemset mining in high-dimensional data
Published 2017“…Mining frequent itemsets from large dataset has a major drawback in which the explosive number of itemsets requires additional mining process which might filter the interesting ones. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014Subjects: Get full text
Get full text
Research Reports -
12
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
Get full text
Get full text
Thesis -
13
-
14
-
15
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
16
Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm
Published 2013“…However, a substantial size of this accumulated amount is discarded anyhow. The processing capabilities have been considered as one of the major barriers in the way of exploiting this priceless mine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Improvement DACS3 Searching Performance using Local Search
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, the CTI dataset, which has been proven by the existing research work as a more suitable Web server logs in the term of Web page recommendation quality, is used for measuring the performance of the proposed modified algorithm for Web page recommendation system. The experiment is divided into three interdependent stages of usage mining process, namely: data preparation, pattern discovery, and recommendation. …”
Get full text
Get full text
Get full text
Thesis -
19
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009“…In the last few years, text mining have become the area of interests in Natural Language Processing (NLP). …”
Get full text
Get full text
Conference or Workshop Item -
20
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis
