Search Results - (( development spatial visualization algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Compacted dither pattern codes over MPEG-7 dominant colour descriptor in video visual depiction by Ranathunga, L., Zainuddin, R., Abdullah, N.A.

    Published 2010
    “…The visual descriptions were performed with the TRECVID 2007 development key frame dataset. …”
    Get full text
    Get full text
    Article
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. It is shown that simple local rules, together with visual experience, such as that provided by dynamic images, are sufficient for the development of the neural architectures. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of saliency metric for autonomous landmark selection in cognitive robot navigation / Gao Hanyang by Gao , Hanyang

    Published 2022
    “…Urban landmarks are spatial features that are visually significant in the neighbourhood. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    The development of spatio-temporal data model for dynamic visualization of virtual geographical information system by Mohd. Rahim, Mohd. Shafry, Daman, Daut

    Published 2006
    “…Volumetric is one type of spatial object in the VGIS, which is used to visualize 3D information. …”
    Get full text
    Get full text
    Monograph
  13. 13

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…However, hyperspectral image systems produce large data sets that are not easily interpretable by visual analysis and therefore require automated processing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Predicting saliency existence using reduced salient features based on compactness and boundary cues by Nadzri, Nur Zulaikhah

    Published 2020
    “…The image background is measured based on the boundary contrast and boundary spatial distribution within the spatial and the frequency domain. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Volumetric spatiotemporal data model by Mohd. Rahim, Mohd. Shafry, Mohamaed Shariff, Abdul Rashid, Alias, Mohammad Ashari

    Published 2007
    “…Volumetric is one type of spatial object in the VGIS, which is used to develop visualize 3D information. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    Spatial variations prediction in carbonate porosity using artificial neural network: Subis Limestones, Sarawak, Malaysia by Ali, Y., Padmanabhan, E., Andriamihaja, S., Faisal, A.

    Published 2019
    “…Several models have been developed to visualize the pore network systems of carbonate rocks. …”
    Get full text
    Get full text
    Article
  18. 18

    Spatial variations prediction in carbonate porosity using artificial neural network: Subis Limestones, Sarawak, Malaysia by Ali, Y., Padmanabhan, E., Andriamihaja, S., Faisal, A.

    Published 2019
    “…Several models have been developed to visualize the pore network systems of carbonate rocks. …”
    Get full text
    Get full text
    Article
  19. 19

    EEG-based brain source localization using visual stimuli by Jatoi, M.A., Kamel, N., Malik, A.S., Faye, I., Bornot, J.M., Begum, T.

    Published 2016
    “…According to the spatial resolution provided, the algorithms are categorized as either low resolution methods or high resolution methods. …”
    Get full text
    Get full text
    Article
  20. 20

    Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images by Maizul, Elly Nur Myaisara

    Published 2018
    “…Meanwhile, the subjective visual assessment of the image sample 5 and 6 has confirmed the micro-crack developments on the concrete SEM images upon which the crack density was 3.02 % and 1.30 %, respectively.…”
    Get full text
    Get full text
    Monograph