Search Results - (( developing human method algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Identify texture of MRI human brain using Adaptive Fuzzy C-Means (AFCM) Algorithm / Faridatul Akma Mohd Noor by Faridatul Akma, Mohd Noor

    Published 2010
    “…To access its viability, a prototype with interactive graphical user interface (GUI) was developed and tested for its reliability. The main objective of this research is to develop a prototype that use Adaptive Fuzzy C-Means (AFCM) algorithm to identify texture of human brain.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective by Mousavi, Seyed Mohsen, Sadeghi R., Kiarash, Lee, Lai Soon

    Published 2023
    “…However, there needs to be more research examining the role of interactive methods in multiobjective optimisation problems. To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
    Get full text
    Get full text
    Article
  11. 11

    Adapting robot kinematics for human-arm motion recognition by Chan, C.S., Liu, H., Brown, D.

    Published 2007
    “…This paper presents a novel method to the analysis of human-arm motion, in particular improving the efficiency of conventional motion recognition algorithms. …”
    Get full text
    Get full text
    Article
  12. 12

    Recognition of human motion from qualitative normalised templates by Chan, C.S., Liu, H., Brown, D.J.

    Published 2007
    “…This paper proposes a Qualitative Normalised Templates (QNTs) framework for solving the human motion classification problem. In contrast to other human motion classification methods which usually include a human model, prior knowledge on human motion and a matching algorithm, we replace the matching algorithm (e.g. template matching) with the proposed QNTs. …”
    Get full text
    Get full text
    Article
  13. 13

    Analysis on reading image through camera image by Amir Hamzah Ani

    Published 2024
    text::Final Year Project
  14. 14

    News classification with human annotators: A case study by Fuddoly, A., Jaafar, J., Zamin, N.

    Published 2015
    “…A combined method using Bracewell's algorithm and top-n method is demonstrated and tested using Indonesian language corpus. …”
    Get full text
    Get full text
    Article
  15. 15

    News classification with human annotators: A case study by Fuddoly, A., Jaafar, J., Zamin, N.

    Published 2015
    “…A combined method using Bracewell's algorithm and top-n method is demonstrated and tested using Indonesian language corpus. …”
    Get full text
    Get full text
    Article
  16. 16

    Analysis Of Human Detection Method In Social Distancing Monitoring by Nur Aina Syafinaz, Muhamad Atfan

    Published 2022
    “…This study aims to analyze human detection using the deep learning method in various positions and to develop social distancing detection using the proposed method. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Implementation and Optimization of Human Tracking System Using ARM Embedded Platform by Teoh, Shen Khang, Yap, Vooi Voon, Soh, Chit Siang, Sebastian , Patrick

    Published 2012
    “…Functions and library in OpenCV which developed by Intel Corporation was utilized for building the human tracking algorithms.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project