Search Results - (( developing intensive application algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- intensive application »
- application algorithm »
- developing intensive »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
8
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…A predictive model was developed to provide a mechanism that can be regionally simulated, and predict low or high risk windstorm, its possible location, time, duration of the risk, intensity as well as potential damages. …”
Get full text
Get full text
Thesis -
9
Numerical Integration And Data Reduction For Application In Photometry
Published 2003Get full text
Get full text
Thesis -
10
-
11
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…The vision system developed is at 90% accuracy. Enhancement on image processing algorithm can greatly contributes to improvements. …”
Get full text
Get full text
Thesis -
12
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…This report discusses the interrogation performance of a cross-correlation based PIV algorithm with interrogation flexibility. In order to assess the developed algorithm, this procedure is tested with synthetic data for uniform linear flow under various experimental conditions. …”
Get full text
Get full text
Final Year Project -
13
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar...
Published 2022“…As a solution, a web application named THR Zone detector is developed to access details about their specified THR according to the percentage intensity of the exercise. …”
Get full text
Get full text
Get full text
Book Section -
14
Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng
Published 2018“…It is found that characteristics of the low-light pixel intensities provide a great challenge to algorithms. …”
Get full text
Get full text
Thesis -
15
-
16
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…Over a few decades, many computer vision systems haven been developed. One of the applications related to computer vision is face recognition and was being interested by many researches. …”
Get full text
Get full text
Thesis -
17
DC motor control using LQR algorithm
Published 2008“…An application in Matlab called Simulink is used as tools for algorithm implementation. …”
Get full text
Get full text
Undergraduates Project Papers -
18
An improved full search block matching algorithm for imaging applications
Published 2012“…Full search block matching algorithm (FSBMA) for motion estimation requires a high level of computations, rendering the technique unsuitable for real-time imaging applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…The real-time contour generation approach instantly generates single layer of contour whenever the build height parameter is fed into the algorithm. The algorithm composes of multiple algorithms such as slicing algorithm, pixel line mapping algorithm, and the contour loop algorithm. …”
Get full text
Get full text
Research Report -
20
