Search Results - (( java application rsa algorithm ) OR ( automatic identification system algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay by Lai, Chong Jin

    Published 2022
    “…This project presents system identification and control of automatic car pedal pressing system for low-speed driving in a road traffic delay. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Smart Cards And The Fingerprint : A Proposed Framework For The Automatic Teller Machine (ATM) System by Mohd. Hasbullah, Omar

    Published 2002
    “…As a result, the research proposed a framework for user identification and authentication in automatic teller machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Mohd Anwar, Mohd Shazlan

    Published 2021
    “…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12
  13. 13

    Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi, Mohd Anwar, Mohd Shazlan

    Published 2021
    “…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Fuzzy modelling for distillation column by Yusof, Rubiyah, Khalid, Marzuki, Ibrahim, M. Z.

    Published 2005
    “…This paper presents a hybrid method to tune the parameters of TS fuzzy system automatically using Genetic Algorithms (GA) and Recursive Least Square (RLS) technique. …”
    Get full text
    Conference or Workshop Item
  17. 17

    Automatic clustering of generalized regression neural network by similarity index based fuzzy c-means clustering by Husain, Hafizah, Khalid, Marzuki, Yusof, Rubiyah

    Published 2004
    “…We applied the technique for system identification and modeling and found the results to be encouraging and efficient. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…Fingerprint identification and verification are one of the most significant and reliable identification methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings