Search Results - (( java implementation rsa algorithm ) OR ( changes a visualization algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…Thus, a Spatiotemporal Data Model is required to manage changes in GIS data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Investigation Of Edge Detection Techniques Based On Brain Tumor Images by Rosnan, Murni Nur Athirah

    Published 2018
    “…However, from visual perspective, Sobel operator produced better edge maps of the brain tumor compared to the Modified Canny algorithm.…”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13
  14. 14

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…Such problem was faced by a multinational semiconductor manufacturer. Therefore a study was conducted to introduce a new algorithm to inspect integrated circuit package markings. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…A multi-date post-classification comparison algorithm was used to determine LULC changes in two intervals, 1986-1990, and 1990-2000. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Target tracking using color based particle filter by Mukhtar, A., Xia, L.

    Published 2014
    “…A robust and efficient visual target tracking algorithm using particle filtering is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Permutation entropy based full-reference image quality qssessment by Baqar, Mohtashim *, Lau, Sian Lun *, Mansoor Ebrahim

    Published 2019
    “…Permutation entropy helps in detecting and visualizing changes related to structures with the correlation between successive samples instead of considering magnitudes of the signal, and since, perception of an image to the HVS changes more because of structural changes in an image rather than that of visible errors i.e. …”
    Get full text
    Get full text
    Conference or Workshop Item