Search Results - (( developing interactive cell algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A review of open-source image analysis tools for mammalian cell culture: algorithms, features and implementations by Malik, Hafizi, Idris, Ahmad Syahrin, Toha @ Tohara, Siti Fauziah, Mohd Idris, Izyan, Daud, Muhammad Fauzi, Azmi, Nur Liyana

    Published 2023
    “…Computer scientists have developed algorithms to automate cell imaging analysis, but they are not widely adopted by biologists, especially those lacking an interactive platform. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Inter-cell and intra-cell layout design in a cellular manufacturing system by Ariafar, Shahram, Ismail, Napsiah, Tang, Sai Hong, Mohd Ariffin, Mohd Khairol Anuar, Firoozi, Zahra

    Published 2011
    “…To validate the developed algorithm, the results obtained by the algorithm are compared to the results of an exhaustive search. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    An AUSM-based high-order compact method for solving Navier-Stokes equations by Mawlood M.K., Basri S.N., Asrar W., Omar A.A., Mokhtar A.S., Ahmad M.M.H.M.

    Published 2023
    “…A high-order compact upwind algorithm is developed for solving Navier-Stokes equations in two-space dimensions. …”
    Article
  10. 10
  11. 11

    Adaptive mesh refinement immersed boundary method for simulations of laminar flows past a moving thin elastic structure by Aldlemy, M.S., Rasani, M.R., Ariffin, A.K., Ya, T.M.Y.S.T.

    Published 2020
    “…Hence, in this work, an algorithm is developed to simulate fluid-structure interactions of moving deformable structures with very thin thicknesses. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD) by Gilani Mohamed, Mohamed Ahmed

    Published 2022
    “…This study indicates developing an algorithm for detecting and progressing through the hippocampus of patients with Alzheimer's disease in MRI images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    EMG signal classification for human computer interaction: a review by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2009
    “…With the ever increasing role of computerized machines in society, Human Computer Interaction (HCI) system has become an increasingly important part of our daily lives. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Numerical simulation of fluid flow in three dimensional domain based on two stage pressure-velocity correction method by Sabir, O., Ya, T.M.Y.S.T.

    Published 2015
    “…The stability of the developing method remain at the same level with other immersed boundary methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Numerical simulation of fluid flow in three dimensional domain based on two stage pressure-velocity correction method by Sabir, O., Ya, T.M.Y.S.T.

    Published 2015
    “…The stability of the developing method remain at the same level with other immersed boundary methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Study on an application of bioengineering by layer TIRF measurement by Syukran Hakim, Norazman

    Published 2013
    “…The nature inside bacterial cell has traditionally been viewed as an environment where intermolecular interactions are governed by isotropic diffusion. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Finite Element Modeling Of Ballistic Penetration into Fabric Armor by Talebi, Hossein

    Published 2006
    “…An automatic geometry generation algorithm for textile is developed that can generate complex fabric geometries spanning several unit cells. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Morphology, molecular characterization and habitat preference of harmful Benthic dinoflagellate gambierdiscus (Dinophyceae) in Malaysia / Nurin Izzati Mustapa by Nurin Izzati , Mustapa

    Published 2020
    “…Morphological information and the distribution of Gambierdiscus species were used to develop a comprehensive taxonomic database of Gambierdiscus, and a 3I web-based interactive identification key for species identification is presented. …”
    Get full text
    Get full text
    Get full text
    Thesis