Search Results - (( java implementation rsa algorithm ) OR ( program detection clustering algorithm ))
Search alternatives:
- detection clustering »
- java implementation »
- implementation rsa »
- program detection »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…The proposed clustering algorithm is programmed and tested on synthetic and four real-world datasets using the R software. …”
Get full text
Get full text
Article -
9
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…In this paper, we proposed profound learning strategy to address three primary assignments developing in the zone of skin lesion picture preparation, i.e., dermoscopic highlight, extraction and detection. A profound algorithm comprising of preprocessing in CIELAB color space and Delaunay triangulation based clustering along with Particle Swarm Optimization (PSO) is proposed for the segmentation. …”
Get full text
Get full text
Get full text
Article -
10
Handwriting recognition using webcam for data entry
Published 2015“…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Conference or Workshop Item -
11
Handwriting recognition using webcam for data entry
Published 2014“…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Final Year Project -
12
Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia
Published 2017“…This will assist in planning for the right crop rotation and proper disease management programs.…”
Get full text
Get full text
Thesis -
13
Random Amplified Polymorphic DNA Analysis of Four Breeds of Sheep in Malaysia
Published 1999“…The neighbour-joining and the UPGMA trees based on the Dice's and Jaccard's similarity indices showed little or no consensus on the clustering of the individuals in each population. Genetic distance between populations ranged from 0.1040 to 0.1357 based on the Dice's algorithm while the distance based on the Jaccard's algorithm ranged from 0.1875 to 0.2381. …”
Get full text
Get full text
Thesis -
14
Preliminary study on genetic distance of Vibrio parahaemolyticus isolates from diseased fish and shrimp brackishwater ponds by random amplified polymorphic DNA (RAPD) in Malaysia
Published 2003“…Two published 10-mer arbitrary primers (Gen1-50-01 and Gen1-50-02) were used for detecting DNA polymorphisms. RAPDistance program (version 1.04) was used to analyze the RAPD patterns. …”
Get full text
Get full text
Get full text
Article -
15
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…In addition, a new method to detect weak areas in a system termed as Weak Area Clustering Margin (WACM) was also developed. …”
Get full text
Get full text
Thesis
