Search Results - (( java implementation rsa algorithm ) OR ( basic detection clustering algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Cluster-based spectrum sensing scheme in heterogeneous network by Hasan, Mohammad Kamrul, Ismail, Ahmad Fadzil, Hassan Abdalla Hashim, Aisha, Mohd. Ramli, Huda Adibah, Hashim, Wahidah, Islam, Shayla, Badron, Khairayu

    Published 2014
    “…A cluster formation algorithm is also proposed in where, cluster head (CH) and signaling node (SN) will detect implies the multi-channel SS technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Cluster-based spectrum sensing scheme in heterogeneous network by Hasan, Mohammad Kamrul, Ismail, Ahmad Fadzil, Mohd. Ramli, Huda Adibah, Hassan Abdalla Hashim, Aisha, Islam, Shayla, Hashim, Wahidah, Badron, Khairayu

    Published 2015
    “…A cluster formation algorithm is also proposed in where, cluster head (CH) and signaling node (SN) will detect implies the multi-channel SS technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12
  13. 13

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Three experiments have been conducted on textual Reuters corpus, Classic and WAP dataset. The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation by Mahdavipour, Zeinab

    Published 2016
    “…The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. The methods have been applied for detecting, clustering and classification polycrystalline solar wafer images, corresponding to defects such as micro cracks, stain, and fingerprints. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin, Rangkuti, Chalillullah

    Published 2010
    “…Structure and network weights for the NF model are determined by a synergetic approach – Data clustering and Gradient Descent algorithm. Operation data collected in 10 seconds interval and for one day is used for model training and validation. …”
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    i-ManGoeS by Ahmad, Khairul Adilah, Abdul Malik, Anis Faradella

    Published 2017
    “…In this paper, an activity recognition system based on edge detection from a digital camera is presented. The system makes use of machine learning techniques to classify the actions that are described with a set of a few basic gestures. …”
    Get full text
    Get full text
    Get full text
    Book Section