Search Results - (( its application mining algorithm ) OR ( based application ((rsa algorithm) OR (_ algorithm)) ))*
Search alternatives:
- application mining »
- based application »
- mining algorithm »
- its application »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
5
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
6
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
7
-
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
10
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…In this paper, we propose a new method based on prime number and its characteristics mainly for interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
11
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
13
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
14
-
15
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014Get full text
Conference or Workshop Item -
16
-
17
Prime-based method for interactive mining of frequent patterns
Published 2010“…Thus far, a few efficient interactive mining algorithms have been proposed. However, their runtime do not fulfill the need of short runtime in real time applications especially where data is sparse and proper frequent patterns are mined with very low values of minsup. …”
Get full text
Get full text
Thesis -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
-
20
