Search Results - (( some application clustering algorithm ) OR ( based application rsa algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…The purpose of this paper is to shed light on some algorithms in the literature on density-based clustering over data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Fuzzy clustering algorithms and their applications to chemical datasets by Shah, Jehan Zeb, Salim, Naomie

    Published 2005
    “…In this paper a number of fuzzy clustering approaches like fuzzy c-mean, Gustafson and Kessel , Gath and Geva, fuzzy c-varieties, adaptive fuzzy , fuzzy based c-shell algorithms and some other aspects of fuzzy clustering are discussed.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Some clustering algorithms, especially those that are partitioned-based, clusters any data presented to them even if similar features do not present. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  20. 20

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Even though, there is a tool for clustering, some of this tool required an expert knowledge in clustering in order to understand the results. …”
    Get full text
    Get full text
    Thesis