Search Results - (( mining reduction methods algorithm ) OR ( based information rsa algorithm ))
Search alternatives:
- reduction methods »
- methods algorithm »
- based information »
- information rsa »
- rsa algorithm »
-
1
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
2
-
3
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
4
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
5
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
6
New directions in factoring the prime power RSA modulus N = prq
Published 2016Get full text
Get full text
Conference or Workshop Item -
7
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…RSA is one public key Cryptosystem to secure information and communication from third parties and it can be factor by user authentication. …”
Get full text
Get full text
Student Project -
10
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
12
Extending LSB-based partial key exposure to RSA with special-structured primes
Published 2026“…Previous studies have shown that RSA becomes vulnerable when its prime factors follow special algebraic structures or when partial information about their least significant bits (LSBs) is exposed. …”
Get full text
Get full text
Get full text
Article -
13
Document classification based on kNN algorithm by term vector space reduction
Published 2023Conference Paper -
14
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
15
-
16
Data mining reduction methods and performances of rules
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis -
19
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The reduction method contains two techniques, namely features reduction and data reduction which are commonly applied to a classification problem. …”
Get full text
Get full text
Conference or Workshop Item -
20
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…In rough set approach to data mining, the set of interesting rules are determined using a notion of reduct. …”
Get full text
Get full text
Thesis
