Search Results - (( data conversion process algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A hybrid P-graph and WEKA approach in decision-making: waste conversion technologies selection by Ali, Rabiatul Adawiyah, Nik Ibrahim, Nik Nor Liyana, Wan Abdul Karim Ghani, Wan Azlina, Sani, Nor Samsiah, Hon, Loong Lam

    Published 2022
    “…Then, using the WEKA software, the data from the feasible structure would be processed and evaluated using the chosen algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…Further, we highlight other performance measures for online algorithms with the goal of realistic performance evaluation process.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Optimization of emulsion polymerization of styrene and methyl methacrylate (MMA) by Yok, Loke Kam

    Published 2013
    “…Using gPROMS, the system analyzed the data, created models, developed algorithms, manipulated and plotted based on the functions and data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The security provided by this algorithm can be enhanced further, if more than one algorithm is applied to data.…”
    Get full text
    Get full text
    Student Project
  15. 15

    Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set by Yap, Chau Tean

    Published 2022
    “…Data pre-processing on the data set may improve the classification results. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…In recent years the application of computer-based image processing techniques to a range of traffic data collection tasks has been successfully demonstrated. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Simulation of elliptical core few mode fiber switch in mode division multiplexing for enhancing bandwidth performance by Zengeni, Tendai

    Published 2023
    “…As a result, Elliptical Core Few Mode Fiber (EC-FMF) is used to converge specific modes which depend on the refractive index changes in the core to undergo a mode conversion process for switching. This switching mechanism uses an elimination algorithm which removes unwanted modes leaving behind the ones with optimum power to propagate data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Multivariate Optimization of Biosynthesis of Triethanolamine-Based Esterquat Cationic Surfactant Using Statistical Algorithms by Fard Masoumi, Hamid Reza

    Published 2011
    “…All process parameters are selected to conduct the optimization by using some statistical algorithms such as Artificial Neural networks (ANNs), Response Surface Methodology (RSM), Wavelet Neural Network (WNN) and Partial Least Squares (PLS). …”
    Get full text
    Get full text
    Thesis
  20. 20