Search Results - (( image classification parallel algorithm ) OR ( java based encryption algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…The low-level features such as edges, blobs, and ridges were extracted for grouping and classification. Object recognition and image classification comes after the wavelet transform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7
  8. 8
  9. 9

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Combining deep and handcrafted image features for MRI brain scan classification by Hasan, Ali M., Jalab, Hamid A., Meziane, Farid, Kahtan, Hasan, Al-Ahmad, Ahmad Salah

    Published 2019
    “…More recently, the application of deep learning algorithms to medical imaging leads to impressive performance enhancements in classifying and diagnosing complicated pathologies, such as brain tumors. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Robust partitioning and indexing for iris biometric database based on local features by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy

    Published 2018
    “…The proposed method combines three transformation methods DCT, DWT and SVD to analyse iris images and extract their local features. Further, the scalable K-means++ algorithm is used for partitioning and classification processes, and an efficient parallel technique that divides the features groups causing the formation of two b-trees based on index keys is applied for search and retrieval. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors by Yew , Tze Ee

    Published 2016
    “…KNCN is a type of classification technique in image processing which involves calculation of centroid and sorting of K-nearest centroid neighbors. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Square patch feature based face detection architecture for high resolution smart camera by Mohd Mustafah, Yasir, Bigdeli, Abbas, Azman, Amelia Wong, Lovell, Brian

    Published 2010
    “…From The simulation result shows that the proposed face detection architecture could speed up the equivalent software based face detector up to 12 times. Parallelizing the feature classification modules could improve the performance further.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
    Get full text
    Get full text
    Book Section
  19. 19

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
    Get full text
    Get full text
    Thesis