Search Results - (( java implementation rsa algorithm ) OR ( changes activation detection algorithm ))
Search alternatives:
- activation detection »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study
Published 2020“…Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
Get full text
Get full text
Get full text
Article -
7
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
8
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
9
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
Get full text
Get full text
Thesis -
10
Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan
Published 2017“…It is difficult to identify the authenticity of the image since they left no trace for such changes in the image. Forgery detection techniques are divided into two approaches; active and passive. …”
Get full text
Get full text
Thesis -
11
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…Regression testing is one of the software maintenance activities that is time consuming and expensive. Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
Get full text
Get full text
Get full text
Article -
12
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Driver drowsiness detection using different classification algorithms
Published 2020“…Electrocardiogram (ECG) is an electrical indicator of the heart, provides such criteria as it reflects the heart activity that can detect changes in human response which relates to our emotions and reactions. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Automatic Road Network Recognition and Extraction for Urban Planning
Published 2009“…These results are valuable for building road map and detecting the changes of the existing road database. …”
Get full text
Get full text
Get full text
Article -
16
Zebrafish larvae locomotor activity detection using Convolutional NeuraL Network (CNN)
Published 2022“…To overcome the limitations, this works aims to develop an algorithm to elucidate the zebrafish larvae locomotor activity using Convolutional Neural Network (CNN). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
ARDUINO-BASED FALL DETECTION AND ALERT SYSTEM
Published 2017“…This project developed a robust algorithm with a sensitive and an accurate result for fall detection device by more than 90%.…”
Get full text
Get full text
Final Year Project -
18
Development of a flexible video analysis system for motion detection and alarm generation
Published 2010“…This SVAS is able to detect and track interested objects. It can also detect people and recognize their activities in an application environment, such as in a room, supermarket, car, or security checkpoint. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A student learning style auto-detection model in a learning management system
Published 2023“…This paper proposes an auto-detection model of student learning styles in learning management systems based on student learning activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
