Search Results - (( _ (normalization OR localization) mining algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- mining algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
7
-
8
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this technique, the visitor agent is equipped with an algorithm, which detects the potential norms through the system's log file, interactions with the local agents, and observing the local agents in action. …”
Get full text
Conference or Workshop Item -
9
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The scale-up experiment showed that the proposed algorithm is more scalable than the other existing algorithms. …”
Get full text
Get full text
Thesis -
10
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014“…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Clustering is an unsupervised classification method with aim of partitioning, where objects in the same cluster are similar, and objects belong to different clusters vary significantly, with respect to their attributes. The K-means algorithm is a famous and fast technique in non-hierarchical cluster algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
13
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
14
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Hence, this study carried out several objectives to augment the support of modified clustering algorithm. Firstly, an extended K-Means clustering algorithm (called X-Means algorithm) is proposed to filter/remove the noise from user session data to eliminate outliers or irrelevant pages. …”
Get full text
Get full text
Get full text
Thesis -
15
A norms mining approach to norms detection in multi-agent systems
Published 2023“…In this technique, the visitor agent is equipped with an algorithm, which detects the potential norms through the system's log file, interactions with the local agents, and observing the local agents in action. …”
Conference paper -
16
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
17
A novel approach to data mining using simplified swarm optimization
Published 2011“…Therefore, the proposed SSO rule-based classifier with local search strategies has offered a new paradigm shift in solving complex problems in data mining which may not be able to be solved by other benchmark classifiers.…”
Get full text
Get full text
Thesis -
18
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
19
Hybrid ant colony optimization and genetic algorithm for rule induction
Published 2020“…The AntMiner classifier is efficient, useful and commonly used for solving rulebased classification problems in data mining. Ant-Miner, which is an ACO variant, suffers from local optimization problem which affects its performance. …”
Get full text
Get full text
Get full text
Article -
20
Optimizing Tree-Based Contrast Subspace Mining Using Genetic Algorithm
Published 2022“…However, the contrast subspace search of the tree-based method may be trapped in local optima within the search space. This paper proposes a tree-based method which incorporates genetic algorithm to optimize the contrast subspace search by identifying global optima contrast subspace. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
