Search Results - (( java application rsa algorithm ) OR ( sequence identification based algorithm ))
Search alternatives:
- sequence identification »
- identification based »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…At present, DNA sequencing analysis is the most utilised technique for species identification where patterns of DNA sequences are determined by comparing the sequence to comprehensive databases. …”
Get full text
Get full text
Thesis -
6
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…At present, DNA sequencing analysis is the most utilised technique for species identification where patterns of DNA sequences are determined by comparing the sequence to comprehensive databases. …”
Get full text
Get full text
Book Section -
7
Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga
Published 2022“…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
A modified algorithm for species specific motif discovery
Published 2010“…This study showed that a slower algorithm is still needed and has value based on how critical the problem is.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
DNA motif identification using LPBS
Published 2016“…In recent years, several deoxyribonucleic acid (DNA)-based approaches have been developed for species identification including DNA sequencing. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…Radio Frequency Identification (RFID) is a technology that is used for wireless monitoring, tracking and identification of an object. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…The algorithm considers two production factors, operation sequences and production volumes of each part as well as the number of cells can be identified in advance. …”
Get full text
Get full text
Thesis -
14
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…Most of the current algorithms for parameter identification are based on the assumption that transmission line is fully transposed and the corresponding components are symmetric. …”
Get full text
Get full text
Thesis -
15
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Detailed method to identify the gut mycobiome in colorectal cancer patients using ITS-specific amplicon sequencing. •Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
Get full text
Get full text
Get full text
Article -
16
-
17
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
18
A Study of the Contribution of Nearest-Neighbour Thermodynamic Parameters to the DNA Sequences Generated by Ant Colony Optimisation
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Fingerprint recognition system
Published 2005“…To solve this problem,a prototype for recognition fingerprint was implemented the Fast Fourier Transform (FFT) technique for features extraction and Euclidean Distance for template matching.The waterfall methodology has been used in this prototype because it can provide an orderly sequence of development steps and help to ensure the and quality,reliability, maintainability.Features extraction algorithm will produce the reference number.In addition, template matching algorithm will do the comparison between the fingerprint image based on the reference number either it is similar or not.As a result of this technique, the input fingerprint image will be match with the store fingerprint image if there are the similar images. …”
Get full text
Get full text
Undergraduates Project Papers -
20
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…A system identification in control engineering field is a mathematical model based on dynamic properties of the system. …”
Get full text
Get full text
Thesis
