Search Results - (( developing developing human algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Identify texture of MRI human brain using Adaptive Fuzzy C-Means (AFCM) Algorithm / Faridatul Akma Mohd Noor by Faridatul Akma, Mohd Noor

    Published 2010
    “…To access its viability, a prototype with interactive graphical user interface (GUI) was developed and tested for its reliability. The main objective of this research is to develop a prototype that use Adaptive Fuzzy C-Means (AFCM) algorithm to identify texture of human brain.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method by Al-Mohair, Hani Kaid Saif

    Published 2017
    “…The experimental results reveal that the developed algorithm is able to achieve an accuracy of 87.82% F1-measure based on images from the ECU database. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Machine learning: tasks, modern day applications and challenges by Aljuaid, Lamyaa Zaed, Koh, Tieng Wei, Sharif, Khaironi Yatim

    Published 2019
    “…These machine learning algorithms are a collection of complex mathematical models and human intuitions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Algorithm for robot writing using character segmentation by Yussof S., Anuar A., Fernandez K.

    Published 2023
    “…Through our experiment, it has been proven that the algorithm developed is able to allow the robotic arm to write. � 2005 IEEE.…”
    Conference Paper
  10. 10

    Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…The vision system developed is fully operational with human as communicator between parts inspected and results displayed through GUI. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Develop and Implementation of Autonomous Vision Based Mobile Robot Following Human by Mohd Shah, Hairol Nizam, Ab Rashid, Mohd Zamzuri

    Published 2013
    “…Human tracking algorithm will be developed to allow a mobile robot to follow a human.…”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm by Asnawi, Rustam, Wan Ahmad, Wan Fatimah, A. Rambli, Dayang R.

    Published 2010
    “…This paper describes a multipurpose integrated multimedia presentation system (IMPS) based on channel controller model (CCM) algorithm. By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Car plate recognition system : (segmentation) by Nor Helmy Effendy, Meon

    Published 2005
    “…Therefore,the purpose of this research is to develop a prototype by referring the University College of Engineering & Technology of Malaysia (UTEC) as the case study.The use of human workforce for the safety control in UTEC really cannot be implemented consistently and effectively since human ability is limited. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri by Muhamad Shukri, Muhamad Nur Adhwa

    Published 2017
    “…The technique used to recognize human emotions is an AdaBoost algorithm as classifier. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development Of Control Algorithm For Spot Cooling System by Andy, Tan Wei Keat

    Published 2017
    “…This project’s aim is to develop a Control Algorithm for Spot Cooling system. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…As a consequence, this research will present the idea in developing to design robust and reliable fuzzy clustering particularly in dealing with knowledge of human being.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis