Search Results - (( using ((solution mining) OR (solution using)) algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- solution using »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Keeping in view the drawbacks of gradients based learning of ANFIS using gradient descent and least square methods in two-pass learning algorithm, many have trained ANFIS using metaheuristic algorithms. …”
Get full text
Get full text
Article -
6
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Improvement DACS3 Searching Performance using Local Search
Published 2009“…Therefore this research aims to improve the algorithm using various supportive and improvement strategies. …”
Get full text
Get full text
Conference or Workshop Item -
8
Data Classification and Its Application in Credit Card Approval
Published 2004“…Sample credit card approval dataset is used to demonstrate the functionality of a data mining solution prototype, which includes the typical tasks of a decision tree induction process: data selection, data preprocessing, decision tree induction, tree pruning, rules generation and validation. …”
Get full text
Get full text
Final Year Project -
9
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
Get full text
Get full text
Thesis -
10
Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem
Published 2022“…The Greedy heuristics by ratio was employed to construct an initial solution. Next, the solution was enhanced by using the hybrid TS-SBA. …”
Get full text
Get full text
Get full text
Thesis -
11
A numerical method for frequent pattern mining
Published 2009“…The PC_Miner algorithm traverses the PC_Tree by using an efficient pruning technique. …”
Get full text
Get full text
Article -
12
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Then, the system implementation part explains the selected tools chosen for implementing the system which using the Clementine Data Mining Solution. System testing the was done for checking and detecting error or malfunction of the system. …”
Get full text
Get full text
Thesis -
13
Logistic regression methods for classification of imbalanced data sets
Published 2012“…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
Get full text
Get full text
Thesis -
14
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
15
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…These binary variables are used to locally search for optimum solution. SDAA is developed using the concept of male ants performing nuptial flights to generate new superior colonies. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
19
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
20
Towards scalable algorithm for closed itemset mining in high-dimensional data
Published 2017“…Unlike many well-known algorithms, BFF traverses the search tree in breadth-first manner resulted to a minimum use of memory and less running time. …”
Get full text
Get full text
Get full text
Get full text
Article
