Search Results - (( java application rsa algorithm ) OR ( data verification mining algorithm ))
Search alternatives:
- verification mining »
- data verification »
- java application »
- mining algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Data mining analysis takes place in four stages: data pre-processing, data classification, classification of attributes by stages of CKD, and classification model verification using Microsoft Excel and Waikato Environmental for Knowledge Analysis (WEKA) version 3.8.5 software. …”
Get full text
Get full text
Monograph -
6
An enhanced intelligent database engine by neural network and data mining
Published 2000“…An Intelligent Database Engine (IDE) is developed to solve any classification problem by providing two integrated features: decision-making by a backpropagation (BP) neural network (NN) and decision support by Apriori, a data mining (DM) algorithm. Previous experimental results show the accuracy of NN (90%) and DM (60%) to be drastically distinct. …”
Get full text
Get full text
Article -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
A Hybrid Evaluation Metric for Optimizing Classifier
Published 2011Get full text
Get full text
Get full text
Proceeding -
10
A hybrid evaluation metric for optimizing classifier
Published 2011Get full text
Get full text
Conference or Workshop Item
