Search Results - (( developing initial detection algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. SRS is normally produced during the initial part of software development process and all subsequent steps in software development are influenced by the requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid. by Abdul Khalid, Noor Elaiza

    Published 2010
    “…For this purpose, two algorithm are has been developed to automatically detect the OC and IC. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
    Get full text
    Get full text
    Article
  16. 16

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas by Md Jelas, Imran

    Published 2022
    “…Later, Long Short-Term Memory (LSTM) artificial neural network (ANN) is proposed as training algorithm in training module and prediction algorithm in detection module to be used for the development of the actual system based on this proposed framework initiative. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD) by Gilani Mohamed, Mohamed Ahmed

    Published 2022
    “…This study indicates developing an algorithm for detecting and progressing through the hippocampus of patients with Alzheimer's disease in MRI images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis