Search Results - (( developing automatic identification algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- identification algorithm »
- developing automatic »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Secondly, it aims to develop an automatic gender recognition model by employing optimization algorithms to identify the most effective channels for gender identification from emotional-based EEG signals. …”
Get full text
Get full text
Article -
6
Feature extraction using spectral centroid and mel frequency cepstral coefficient for Quranic accent automatic identification
Published 2014Get full text
Get full text
Conference or Workshop Item -
7
Development of Acute Stroke Lesion Segmentation Algorithm in Brain MRI using Pseudo-colour with K-means Clustering
Published 2021“…Research has shown that an automated segmentation from the Magnetic Resonance Image (MRI) is potentially giving more effective and accurate results. This study aims to develop an automatic segmentation by utilizing clustering algorithm for acute ischemic stroke lesion identification. …”
Get full text
Get full text
Get full text
Thesis -
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…So far, several attempts were made to develop automatic systems to help neurophysiologists accurately identify epileptic seizures. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
Get full text
Get full text
Thesis -
12
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
Get full text
Get full text
Get full text
Article -
13
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. This algorithm is capable of finding the correspondences between minutiae in the input image and store template. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Control of pallets in automatic storage and retrieval system
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
15
Assessment of ANN-based auto-reclosing scheme developed on single machine-infinite bus model with IEEE 14-bus system model data
Published 2009“…The results show the efficacy of the developed adaptive automatic reclosing method.…”
Get full text
Get full text
Conference or Workshop Item -
16
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…This method is very tedious and subjective due to different level of expertise and experience. There is a need to develop a low cost automatic corrosion damage identification. …”
Get full text
Get full text
Final Year Project -
17
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…The performance of the algorithm showed that the execution time of ACO is more realistic. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Embedded automated vision for double parking identification system
Published 2018“…A camera was utilized to acquire the image of a parking area, and the image was processed using Beaglebone Black processor. A computer vision algorithm was developed to process the image using background subtraction, region of interest identification, and color analysis. …”
Get full text
Get full text
Get full text
Get full text
Article
