Search Results - (( automatic identification using algorithm ) OR ( java implementation mechanism algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Mohd Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2021
    “…Finally, the k-nearest neighbors ( kNN) classification technique was used for automatic gender identification of an emotional-based EEG dataset. …”
    Get full text
    Get full text
    Article
  3. 3

    Feature extraction using spectral centroid and mel frequency cepstral coefficient for Quranic accent automatic identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Nematollahi, Mohammad Ali, Hassan, Abd Rauf

    Published 2014
    “…This paper presents the process of Quranic Accent Automatic Identification. Recent feature extraction technique that is used for Quranic verse rule identification/Tajweed include Mel Frequency Cepstral Coefficients (MFCC) which prone to additive noise and may reduce the classification result. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  9. 9

    System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay by Lai, Chong Jin

    Published 2022
    “…Both controllers were then implemented and tested in automatic car pedal pressing system. The controller gains were tuned using metaheuristic algorithm which is Particle Swarm Algorithm (PSO) for optimal values of fuzzy controller parameters. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Smart Cards And The Fingerprint : A Proposed Framework For The Automatic Teller Machine (ATM) System by Mohd. Hasbullah, Omar

    Published 2002
    “…As a result, the research proposed a framework for user identification and authentication in automatic teller machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  17. 17
  18. 18

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    The efficacy of deep learning algorithm in classifying chilli plant growth stages by Muammar Rozilan, Danial Mirza, Hanafi, Marsyita, Ali, Roslizah, Razak, Mohd Adib, Cui, Hairu

    Published 2021
    “…The demand in this field has created various opportunities, especially for automatic classification using deep learning methods. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20