Search Results - (( java application rsa algorithm ) OR ( data solution ((using algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Towards scalable algorithm for closed itemset mining in high-dimensional data by Md. Zaki, Fatimah Audah, Zulkurnain, Nurul Fariza

    Published 2017
    “…This paper presents BFF, a scalable algorithm for discovering closed frequent itemsets from high-dimensional data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  6. 6

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…The algorithm and each of its layers are extensively evaluated using real market data and news content across multiple years and have proven to be solid and superior to any other comparable solution. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Improvement DACS3 Searching Performance using Local Search by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2009
    “…Embedding such behavior has improved quality of solution and time taken to reach the solution. However, the algorithm performance is reduced for large data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…Classification of imbalanced data sets is one of the important researches in Data Mining community, since the data sets in many real-world problems mostly are imbalanced class distribution. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…Problem statement: Ffrequent patterns are patterns that appear in a data set frequently. Finding such frequent patterns plays an essential role in mining associations, correlations and many other interesting relationships among data. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems by Haneen, Abd Wahab, Noraziah, Ahmad, Alsewari, Abdulrahman A., Sinan, Q. Salih

    Published 2019
    “…The processes of retrieving useful information from a dataset are an important data mining technique that is commonly applied, known as Data Clustering. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  19. 19

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…Also, data clustering has become popular in data mining in recent time due to data explosion. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems by Abdulwahab, Haneen A., Noraziah, Ahmad, Al-Sewari, Abdul Rahman Ahmed Mohammed, Salih, Sinan Q.

    Published 2019
    “…The processes of retrieving useful information from a dataset are an important data mining technique that is commonly applied, known as Data Clustering. …”
    Get full text
    Get full text
    Get full text
    Article