Search Results - (( developing intensive method algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing intensive »
- intensive method »
- method algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs
Published 2006“…Finally. a defect segmentation algorithm was developed to segment the defects automatically from the image using background subtraction and rank leveling method.…”
Get full text
Get full text
Thesis -
7
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This project is completed phase by phase and for the system development, the method used is evolutionary development approach. …”
Get full text
Get full text
Final Year Project -
8
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…For the establishment of back-propagation algorithms, it does not only use Artificial Neural Network (ANN) model but also other techniques such as multiple regression analysis, dichotomous forecast method and error difference method. …”
Get full text
Get full text
Thesis -
9
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
10
Jogging activity recognition using k-NN algorithm
Published 2022“…To recognize and classify the level of jogging intensity, k-Nearest Neighbours (k-NN) algorithms will be considered as a machine learning method. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…In preprocessing phase, s detail studies and intensive experiments were conducted to obtain a suitable method of segmentation. …”
Get full text
Get full text
Thesis -
12
Numerical Integration And Data Reduction For Application In Photometry
Published 2003“…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
Get full text
Get full text
Thesis -
13
Development Of Digital Image Re-Colouring Algorithm
Published 2018Get full text
Get full text
Monograph -
14
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…The performance of the algorithm is validated by using the developed database under four luminance intensities and achieved promising results. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm
Published 2004“…Its Segmentation is problematic due to radio frequency inhomogeneity, caused by inaccuracies in the magnetic resonance scanner and by movement of the patient which produce intensity variation over the image, and that makes every segmentation method fail. …”
Get full text
Get full text
Thesis -
17
Development Of Automatic Liver Segmentation Method For Three- Dimensional Computed Tomography Dataset
Published 2018“…The segmentation results from the algorithm developed are competitive. However, improvements still can be made.…”
Get full text
Get full text
Monograph -
18
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng
Published 2018“…It is found that characteristics of the low-light pixel intensities provide a great challenge to algorithms. …”
Get full text
Get full text
Thesis -
20
EEG-based brain source localization using visual stimuli
Published 2016“…According to the spatial resolution provided, the algorithms are categorized as either low resolution methods or high resolution methods. …”
Get full text
Get full text
Article
