Search Results - (( data evaluation based algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Centre-based hard clustering algorithms for Y-STR data / Ali Seman, Zainab Abu Bakar and Azizian Mohd. Sapawi by Seman, Ali, Abu Bakar, Zainab, Mohd. Sapawi, Azizian

    Published 2010
    “…The three algorithms above are experimented and evaluated in partitioning Y-STR haplogroups and Y-STR Surname data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  8. 8

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Performance evaluation of caching placement algorithms in named data network for video on demand service by Abbas, Rasha Salem

    Published 2016
    “…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    3D Point Cloud Data Registration Algorithm Based on Augmented Reality Technology by Liying Feng, Ng Giap Weng, Liyao Ma

    Published 2023
    “…In order to solve the above problems, a 3D point cloud data registration algorithm based on augmented reality technology is proposed, and the 3D data registration model is constructed by combining augmented reality technology, build the evaluation index of 3D point cloud data registration, and carry out the initial registration of 3D point cloud based on the evaluation index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  14. 14

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…Text preprocessing ensures consistent data representation and facilitates validation. The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Mutable composite firefly algorithm for gene selection in microarray based cancer classification by Fajila, Mohamed Nisper Fathima

    Published 2022
    “…The proposed hybrid algorithm known as CFS-Mutable Composite Firefly Algorithm (CFS-MCFA) was evaluated on cancer microarray data for biomarker selection along with the deployment of Support Vector Machine (SVM) as the classifier. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Analysis of string matching compression algorithms by Nadarajan, Krishnaveny, Ahmad Zukarnain, Zuriati

    Published 2008
    “…The compression algorithms are string matching based which are LZW and LZSS. …”
    Get full text
    Get full text
    Article
  20. 20

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph