Search Results - (( java application rsa algorithm ) OR ( based transformation method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancement of Single and Composite Images Based on Contourlet Transform Approach by Melkamu, Hunegnaw Asmare

    Published 2009
    “…Therefore, the enhancement approaches are based on a new 'true' two-dimensional transform called contourlet transform. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Clustering Spatial Data Using a Kernel-Based Algorithm by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2005
    “…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Classification of fault and stray gassing in transformer by using duval pentagon and machine learning algorithms by Haw, Jia Yong, Mohd Yousof, Mohd Fairouz, Abd Rahman, Rahisham, Talib, Mohd Aizam, Azis, Norhafiz

    Published 2022
    “…However, there are times where the produce of stray gassing event might lead to fault indication in the transformer. Machine learning algorithms are used to classify the DGA data into normal condition and corresponding faults based on IEEE limits and Duval pentagon method. …”
    Get full text
    Get full text
    Article
  12. 12

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In this research, it is to apply the Hilbert-Huang transform (HHT) as a method to analyse the pressure transient signal. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved stereo matching algorithm based on census transform and dynamic histogram cost computation by Kadmin, Ahmad Fauzan, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Hamid, Mohd Saad, Abd Gani, Shamsul Fakhar

    Published 2021
    “…This new taxonomy improves the local method of stereo matching algorithm based on the dynamic cost computation for disparity map measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Correlation immunity and resiliency of boolean functions from haar domain perspective by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2015
    “…The results in this presentation are based on a simulation study of the Haar-based algorithm in comparison to its Walsh-counterpart. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Local Stereo Matching Algorithm Using Small-Color Census Spared Adaptive Support Weight by Nayan, M Yunus

    Published 2011
    “…This paper proposed an effective disparity estimation algorithm based on census transform with geodesic support weight, called small-color census spared adaptive support weight (SCCADSW). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari

    Published 2014
    “…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
    Get full text
    Get full text
    Article
  17. 17

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…These methods are classified into block-based and key point-based methods. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Novel techniques for enhancement and segmentation of acne vulgaris lesions by Malik, A. S., Humayun, J., Kamel, N., Yap, F. B.-B.

    Published 2013
    “…Methods: For the first objective, an algorithm is developed based on the theory of high dynamic range (HDR) images. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal