Search Results - (( java implementation rsa algorithm ) OR ( program detection clustering algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…In this paper, we proposed profound learning strategy to address three primary assignments developing in the zone of skin lesion picture preparation, i.e., dermoscopic highlight, extraction and detection. A profound algorithm comprising of preprocessing in CIELAB color space and Delaunay triangulation based clustering along with Particle Swarm Optimization (PSO) is proposed for the segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Handwriting recognition using webcam for data entry by Xiang, W.Y., Sebastian, P.

    Published 2015
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia by Rashed, Osamah Zaid Ali

    Published 2017
    “…This will assist in planning for the right crop rotation and proper disease management programs.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Random Amplified Polymorphic DNA Analysis of Four Breeds of Sheep in Malaysia by Vijaya Kumar

    Published 1999
    “…The neighbour-joining and the UPGMA trees based on the Dice's and Jaccard's similarity indices showed little or no consensus on the clustering of the individuals in each population. Genetic distance between populations ranged from 0.1040 to 0.1357 based on the Dice's algorithm while the distance based on the Jaccard's algorithm ranged from 0.1875 to 0.2381. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Preliminary study on genetic distance of Vibrio parahaemolyticus isolates from diseased fish and shrimp brackishwater ponds by random amplified polymorphic DNA (RAPD) in Malaysia by Musa, Najiah, Lee, K. L., Mohd Daud, Hassan, Mohamed Din, Mohamed Shariff, Mohd Lila, Mohd Azmi

    Published 2003
    “…Two published 10-mer arbitrary primers (Gen1-50-01 and Gen1-50-02) were used for detecting DNA polymorphisms. RAPDistance program (version 1.04) was used to analyze the RAPD patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…In addition, a new method to detect weak areas in a system termed as Weak Area Clustering Margin (WACM) was also developed. …”
    Get full text
    Get full text
    Thesis