Search Results - (( quality classification mining algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    Graduates employment classification using data mining approach by Ab Aziz, Mohd Tajul Rizal, Yusof, Yuhanis

    Published 2016
    “…Data Mining is a platform to extract hidden knowledge in a collection of data.This study investigates the suitable classification model to classify graduates employment for one of the MARA Professional College (KPM) in Malaysia.The aim is to classify the graduates into either as employed, unemployed or further study.Five data mining algorithms offered in WEKA were used; Naïve Bayes, Logistic regression, Multilayer perceptron, k-nearest neighbor and Decision tree J48.Based on the obtained result, it is learned that the Logistic regression produces the highest classification accuracy which is at 92.5%. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Estimating 1-MCP application for Kampuchea guava with data mining technology by Ding, Phebe, Khor, Kor Chin

    Published 2018
    “…In this preliminary study, data mining (DM) technology was utilized to achieve fast estimation of 1-MCP application based on different qualities of 'Kampuchea' Guava. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…With closed itemset mining already being a preferred choice for complexity and redundancy reduction during rule generation, this study has further confirmed that overall closed itemset based association rules are also of better quality in terms of classification precision and recall, and precision and recall on individual class examples. …”
    Get full text
    Get full text
    Article
  12. 12

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Various classification algorithms have been developed to produce classification models with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Improved building roof type classification using correlation-based feature selection and gain ratio algorithms by Norman, M., Mohd Shafri, Helmi Zulhaidi, Pradhan, Biswajeet, Yusuf, B.

    Published 2017
    “…Of late, application of data mining for pattern recognition and feature classification is fast becoming an essential technique in remote sensing research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Combining cluster quality index and supervised learning to predict students’ academic performance by Suhaila Zainudin, Rapi’ah Ibrahim, Hafiz Mohd Sarim

    Published 2024
    “…This study employs a combination of data mining tasks, such as clustering and classification, to undertake the prediction task. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Book Chapter
  20. 20

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis