Search Results - (( developing perception based algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…As a result, several content- based image searching systems or met hods were developed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Hence, the development of DIS algorithm has successfully help in producing the edges features on a particular surface topography that are accurate and in line with what has been agreed based on human perception.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This research aims to develop an improved model for subspace clustering based on density connection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This research aims to develop an improved model for subspace clustering based on density connection. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
    Get full text
    Thesis
  11. 11
  12. 12

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…The comparison of results is based on the different user's perceptions, their involvement in the VIGA-20 and the difference of the fitness convergence as compared to Simple Genetic Algorithm.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…This thesis will present the design, development and analysis of performance on a developed Double Stage Filter (DSF) algorithm and other existing stereo matching algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…Therefore, accurate risk perception has become vital. This research aims to develop models for objectively assessing perceived risk. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of an Electronic Visual Aid for Monocular Visual Impaired Patients by Nirvenesh A/L Ravindran

    Published 2023
    “…In terms of software, the algorithms for the field of vision and depth perception was focused. …”
    text::Thesis
  17. 17

    DEVELOPMENT OF AN ELECTRONIC VISUAL AID FOR MONOCULAR VISUAL IMPAIRED PATIENTS by Nirvenesh A/L Ravindran

    Published 2023
    “…In terms of software, the algorithms for the field of vision and depth perception was focused. …”
    text::Thesis
  18. 18

    Tracking The Eyes Using Interdependence Mean Shift Tracking Algorithm With Appropriate Information Provided by Masrullizam, Mat Ibrahim, Syafeeza, Ahmad Radzi, Soraghan, John

    Published 2016
    “…Eyes represent rich of information that able to indicate the reaction, perception, or physiological status of individual. Most of the developed eyes tracking algorithm are not considered the condition of the eyes that would provide the appropriate information to be used in the processes of the facial analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Finally, the popular benchmarks available for developing and evaluating these algorithms are presented along with a comparative study on a different class of algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper