Search Results - (( _ extraction function algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…First, unified ADALINEs based fundamental component extraction algorithm is proposed for dual functionality. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…In addition, no stemming algorithm has been proposed for extracting Pashto root words from the Pashto corpus, which is applicable for the above mentioned functions. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Before bit-plane is extracted, the fingerprint image is enhanced by using Fourier transform. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A liver level set (LLS) algorithm for extracting liver's volume containing disconnected regions automatically by Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Mahmod, Ramlan, Abdul Rashid, Abdul Hamid

    Published 2008
    “…Thus the core of the algorithm is a level set function that has the availability to manage separating and joining liver boundary routinely. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Pengekstrakan data berasaskan pendekatan ontologi: kes data jujukan hidrologi by Abd. Hamid, Ahmad Ghadaffi

    Published 2005
    “…The sequential recognition algorithm is to solve the time consuming issues for extracting sequential data. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An intelligent data mapping for hydrological information system (his) cube data base to cater from various data types by Selamat, Harihodin, Mohd. Rahim, Mohd. Shafry, Daman, Daut

    Published 2004
    “…The sequential recognition algorithm is to solve the time consuming issues for extracting sequential data. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy by Bhandari, A.K., Singh, V.K, Kumar, A., Singh, G.K.

    Published 2014
    “…For this purpose, best solution as fitness function is achieved through CS and WDO algorithm using Kapur’s entropy for optimal multilevel thresholding. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The finding in this project is the k-NN algorithm is good feature extraction and classifier. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise