Search Results - (( some application mining algorithm ) OR ( web application rsa algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  3. 3

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An association rule mining approach in predicting flood areas by Mokhairi, Makhtar, Nur Ashikin, Harun, Azwa, Abdul Aziz, Zahrahtul Amani, Zakaria, Engku Fadzli Hasan, Syed Abdullah, Julaily Aida, Jusoh

    Published 2017
    “…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System by Hanafi, Suryana, Nanna, Hasan Basari, Abd Samad

    Published 2017
    “…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…However, it requires a large amount of cost to be invested in maintenance. Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20