Search Results - (( java implementation rsa algorithm ) OR ( features extraction max algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A modified fuzzy min-max neural network with a genetic-algorithm-based rule extractor for pattern classification by Quteishat, A., Lim, C.P., Tan, K.S.

    Published 2010
    “…Fuzzy if-then rules are extracted from the modified FMM classifier, and a ``don't care'' approach is adopted by the GA rule extractor to minimize the number of features in the extracted rules. …”
    Get full text
    Article
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    ANALYSIS OF BIOSENSOR PHYSIOLOGICAL SIGNALS FOR ASSESSMENT OF NEUROLOGICAL STATUS by QIAN XIN, SOONG

    Published 2018
    “…All the data signals of the 20 subjects will then be processed with features extraction method using mean, maximum (Max), minimum (Min), mean absolute deviation (MAD), Standard deviation (STD), interquartile range (IQR) and summation (Sum). …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…Mu, Beta and Gamma frequency bands related to the motor actions are extracted using customised filters. New features based on time and frequency components of the EEG signals are proposed and tested with classifiers. …”
    Get full text
    Thesis
  9. 9
  10. 10

    Human action recognition using slow feature analysis / Bardia Yousefi by Bardia, Yousefi

    Published 2016
    “…Primarily, a form feature is defined. This feature biologically follows the visual system through applying active basis model and incremental slow feature analysis for extraction of the slowest form features of human object for ventral stream. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…The model included Conv2D and MaxPooling2D layers for feature extraction, followed by a flattened layer and a dense layer with dense, dropout, and batch normalization layers. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automated diagnosis of diabetes using entropies and diabetic index by Acharya, U.R., Fujita, H., Bhat, S., Koh, J.E.W., Adam, M., Ghista, D.N., Sudarshan, V.K., Chua, K.P., Chua, K.C., Molinari, F., Ng, E.Y.K., Tan, R.S.

    Published 2016
    “…These redundant features are eliminated by using six feature selection algorithms: Student's t-test, Receiver Operating Characteristic Curve (ROC), Wilcoxon signed-rank test, Bhattacharyya distance, Information entropy and Fuzzy Max-Relevance and Min-Redundancy (MRMR). …”
    Get full text
    Get full text
    Article
  15. 15

    Automated characterization of coronary artery disease, myocardial infarction, and congestive heart failure using contourlet and shearlet transforms of electrocardiogram signal by Acharya, U.R., Fujita, H., Sudarshan, V.K., Oh, S.L., Adam, M., Tan, J.H., Koo, J.H., Jain, A., Lim, C.M., Chua, K.C.

    Published 2017
    “…Entropies, first and second order statistical features namely, mean (Mn i), min (Min i), max (Mx i), standard deviation (Dst i), average power (Pavg i), inter-quartile range (IQRi), Shannon entropy (Esh i), mean Tsallis entropy (Emts i), kurtosis (Kur i), mean absolute deviation (MAD i), and mean energy (Ωm i), are extracted from each contourlet and shearlet coefficients. …”
    Get full text
    Get full text
    Article
  16. 16

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…The temperature variation for each thermal image was examined using FLIR ResearchIR Max, the camera manufacturer's software, and feature extraction for each thermal image was extracted using FLIR Tools in the FLIR ResearcherIR environment software. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis