Search Results - (( basic integration extraction algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- integration extraction »
- extraction algorithm »
- java implementation »
- implementation rsa »
- basic integration »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…Similarly, a novel region of interest (ROI) extraction technique was developed from which the palmprint creases specifically the principal lines were extracted and teeth were then extracted from the segmented face images respectively. …”
Get full text
Get full text
Get full text
Monograph -
7
-
8
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…Conventional clustering algorithms are able to extract only a single set of flat topics in which local and global topics are mingled and cannot be separated. …”
Get full text
Get full text
Thesis -
9
Proposed fatigue index for the objective detection of muscle fatigue using surface electromyography and a double-step binary classifier
Published 2022“…Muscle fatigue was found to be present and was objectively detected when the value of the proposed fatigue index was equal to or greater than zero. The proposed algorithm was tested on 75 EMG signals that were extracted from 75 middle deltoid muscles. …”
Get full text
Get full text
Article -
10
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…Thirdly, ontology elements from both ontology methods are extracted by using RDF Query Language. Ontology element extraction of manual ontology development consists of three processes namely ontology element selection, query construction and ontology element extracted. …”
Get full text
Get full text
Thesis -
11
Early detection of spots high water saturation for landslide prediction using thermal imaging analysis
“…The performance of these segmentation algorithms are measured using misclassification error. …”
Get full text
Get full text
Research Report -
12
Google the earth: what's next?
Published 2010“…Through remote sensing, our basic scientific knowledge of the Earth and how it functions has expanded rapidly in the last few decades. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
13
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…This project is an automated drone program integrated with image processing for academic purpose. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Early detection of high water saturation spots for landslide prediction using thermal image analysis
Published 2018“…Therefore, after the ROI has been detected, feature extraction and classification must be performed. Statistical based features namely minimum, maximum, mean and standard deviation were extracted from each image channels. …”
Get full text
Get full text
Thesis -
15
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
Get full text
Get full text
Thesis -
18
Prediction Of Antimicrobial Peptides Based On Sequence Alignment And Secondary Structure Sequence And Segment Sequence.pdf
Published 2015“…In this study, a new algorithm is proposed as a computational tool by integrating the sequence alignment method and the secondary structure sequence (SSS) and segment sequence (SS). …”
Get full text
Get full text
Thesis -
19
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis
