Search Results - (( using composition clustering algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- composition clustering »
- using composition »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. The approach such as Genetic Algorithms , Support Vector Machines, Neural Networks as well as clustering has resulted in high accuracy and good detection rates but with moderate false alarm on novel attacks. …”
Get full text
Get full text
Get full text
Article -
12
Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images
Published 2018“…By spatial segmentation of K-Means algorithms, the cluster groups generated were carefully reviewed before proceeding to the final analysis. …”
Get full text
Get full text
Monograph -
13
Unsupervised colour segmentation of white blood cell for acute leukaemia images
Published 2011Get full text
Working Paper -
14
Sustainable Location Identification Decision Protocol (SuLIDeP) For Determining The Location Of Recycling Centres In A Circular Economy
Published 2019“…More significantly, this process could be used for clustering and reducing supply chains complexity to enable the setting up of multiple and optimally located recycling centres. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Computational analysis of biological data: Where are we?
Published 2024“…Computer modeling allows such electrical stimulations using statistics, bioinformatics and advanced machine-learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
16
Dietary patterns and health outcomes among African American maintenance hemodialysis patients
Published 2020“…Implausible energy intake reports were screened out by comparing reported energy intake (rEI) with predicted total energy expenditure (pTEE). Cluster analysis, using the k-means algorithm, identified two distinct dietary patterns in the study population: a high “sugar sweetened beverage” pattern (hiSSB) and a low “sugar sweetened beverage pattern” (loSSB). …”
Get full text
Get full text
Get full text
Article
