Search Results - (( development projects normalization algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
    Get full text
    Get full text
    Thesis
  8. 8

    AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION by LAW, JIN MING

    Published 2022
    “…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Algorithm for calculation of cephalometric soft tissue facial traits by Azam Rana, Mohammad, Setan, Halim, Majid, Zulkepli, Chong, Albert K.

    Published 2007
    “…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…This project suggesting a modified DTW algorithm with the proposed Missed Nodes Recovery Algorithm aims to improve the mapping performance, hence the development of stroke to stroke signature comparison is possible. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…In this project, this sensor-based algorithm is known as the Obstacle Avoidance Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Iris Recognition As Biometric Authentication by Kamaruddin, Muhammad Khairulsyamim

    Published 2016
    “…In this project, the proposed iris recognition technique will be based on the John Daugman’s algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R by Mohd Shamim, Nur Farisha Shuhada

    Published 2020
    “…As to perform these studies, literature review has been executed together with the prototype development. In this paper, all researches and results of this project development completely documented.…”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…The first stage of this project is to develop the neural network using MATLAB Neural Network Toolbox and Borland C++ Builder. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Design and development of elective courses recommender system (ECORS) by Eng, Pei Wen

    Published 2017
    “…A rule-based algorithm is chosen to use in this project. It combines normalized scores representing variables such as interest score including a student's personal interests. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD