Search Results - (( java implementation rsa algorithm ) OR ( leading patterns using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI by Toh, Han Yaung

    Published 2019
    “…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The anomaly data deviate far from normal and may feed wrong information that might lead to wrong decisions and predictions. Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…However, several false and gap sequences had been identified to be present in these databases which lead to false identification. Therefore, this study addresses these problems by introducing a hybrid algorithm for MD. …”
    Get full text
    Get full text
    Book Section
  11. 11

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…Data leakage, also known as pattern leakage, occurs during data preprocessing when information from the testing set is used in training, leading to overfitting and inflated accuracy scores. …”
    Get full text
    Get full text
    Article
  12. 12

    Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan by Nik Mazlan, Nik Aidil Syawalni

    Published 2024
    “…The classification of certain patterns may vary due to differences in the perspectives of individual classifiers, leading to potential inconsistencies. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling of vehicle trajectory using K-means and fuzzy C-means clustering by Choong, Mei Yeen, Lorita Angeline, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2019
    “…Extracted traffic data from the monitoring system is often massive which requires efforts in searching for significant patterns in it. These patterns describe the vehicle movements are useful for observation of any abnormal behavior that leads to traffic conflicts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  14. 14

    Deterministic Automatic Test Pattern Generation for Built-In Self Test System by Mohammed Khalid, Muhammad Nazir

    Published 2006
    “…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…However, several false and gap sequences had been identified to be present in these databases which lead to false identification. Therefore, this study addresses these problems by introducing a hybrid algorithm for MD. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modified Image Enhancement Algorithm For Dorsal Hand Veins Imaging by Gan, Siew Ling

    Published 2018
    “…The noisy binary vein pattern is then enhanced using a combination of Feed-Forward Neural Network (FFNN), Area Opening (AO) and Binary Median Filter (BMF). …”
    Get full text
    Get full text
    Monograph
  17. 17

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The second modification develops a new position update mechanism using the Bat Algorithm movement. The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Such a result indicate that the proposed Improved Fast Scanning algorithm is useful in image segmentation and later contribute in identifying region of interesting in pattern recognition.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement by Loo, Shing Yan

    Published 2013
    “…The predefined joint trajectories are generated using Matsuoka neural oscillator network as the central pattern generator of the quadruped. …”
    Get full text
    Get full text
    Thesis