Search Results - (( java implementation rsa algorithm ) OR ( pattern visualization means algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…In summary, vascular pattern can be detected visually from the palm image acquired by the NIR palm image acquisition device developed in this research.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…Therefore, a corresponding fringe analysis algorithm was developed for De Bruijn colour-coded fringe pattern to circumvent the conventional phase unwrapping techniques which are unreliable and time-consuming. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Identification of plant diseases is key to avoiding losses in agricultural yields and product quantities. Plant disease study means the study of disease patterns that can be visually seen on plants. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The removing method was based on the filtration process applied on the divided image blocks in the spatio-temporal depth technique controlled by an automatic steerable on noise availability in the image. The filter algorithm is based on an enhanced harmonic mean filter algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic Mapping and Visualizing Dengue Incidences in Malaysia Using Machine Learning Techniques by Mathur, N., Asirvadam, V.S., Dass, S.C., Gill, B.S.

    Published 2021
    “…This research focuses on unsupervised learning techniques to predict the density of cases. K-mean, KNN, and Expectation-Maximization (EM) algorithms are used to cluster the cases and visualize the pattern of dengue spread. …”
    Get full text
    Get full text
    Article
  15. 15

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…The maps were geometrically corrected and colour coded for visual interpretation to the PM10 and AOT distributions patterns. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. The framework analyzes extracted traffic features, including packet length and IP address patterns, to detect deviations from normal behaviour without requiring labelled data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. …”
    Get full text
    Get full text
    Get full text
    Thesis