Search Results - (( java application rsa algorithm ) OR ( (parameter OR parameters) extraction process algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…The objective was to identify the optimal parameters for both algorithms in terms of tree height extraction precision. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    ANALYSIS AND OPTIMIZATION OF HYDROCYCLONE GEOMETRY USING BOX-BEHNKEN AND MULTI-OBJECTIVE OPTIMIZATION ALGORITHM by MOHD NOR, MOHD AZRI

    Published 2021
    “…However, the process of designing an optimal hydrocyclone is difficult due to its sensitivity to many parameters such as geometrical dimensions and operational parameters which is still lacking. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Application of image processing and adaptive neuro-fuzzy system for estimation of the metallurgical parameters of a flotation process by Jahedsaravani, A., Massinaei, Mohammad, Marhaban, Mohammad Hamiruce

    Published 2016
    “…Furthermore, the metallurgical parameters of a laboratory flotation cell were successfully predicted from the extracted froth features. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition by Reyfill Konnik, Charlie Ivan

    Published 2014
    “…The motor control algorithm is developed by using DC motor control theory, which involves determining the motor's mechanical and electrical parameters.Upon the completion of mechanical fabrication, circuit design and parameter extraction, the process of developing the navigation algorithm begins. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Automatic Segmentation and Classification of Skin Lesions in Dermoscopic Images by Adil Humayun, Khan

    Published 2024
    “…This process consists of four steps: pre-processing, segmentation, feature extraction, and classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An image processing technique for mental health assessment from Electrophotonic by Janifal Alipal

    Published 2019
    “…As a result, by using ERS algorithm, the image quality is improved and the extracted region derives the maximum and minimum significant region in the image, subsequently improve the existing extraction process. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fast recursive computation of Krawtchouk polynomials by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Sy Mohamed, Sy Abd Rahman Al-haddad, Mahmmod, Basheera M., Jassim, Wissam A.

    Published 2018
    “…Moreover, the proposed algorithm is applied in a face recognition system to determine the impact of parameter p on feature extraction ability. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An image processing technique for mental health assessment from electrophotonic images by Janifal Alipal

    Published 2019
    “…As a result, by using ERS algorithm, the image quality is improved and the extracted region derives the maximum and minimum significant region in the image, subsequently improve the existing extraction process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Smart diagnosis of long bone tumor / Mazni Parimin by Parimin, Mazni

    Published 2005
    “…Here, backpropagation training algorithm will be used and network parameters will be set. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. …”
    Get full text
    Get full text
    Article
  18. 18

    Spatial network k-Nearest neighbor: A survey and future directives by Borhanuddin B., Solemon B.

    Published 2023
    “…In this paper, reviews on several k nearest neighbor algorithms were made through series of journal extractions and experimentation in order to identify the algorithm that achieves highest query performance. …”
    Conference Paper
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  20. 20