Search Results - (( java implementation rsa algorithm ) OR ( program detection method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multicolour object detection using multithreading by Saaidon, Nur'Ain, Sediono, Wahju

    Published 2015
    “…This paper presents the method of detecting multicolour objects and the processing time comparisons of designed algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12

    Analysis Of Human Detection Method In Social Distancing Monitoring by Nur Aina Syafinaz, Muhamad Atfan

    Published 2022
    “…For future planning, datasets need to be around thousand images for the training process to make the detection accuracies increase. This study concludes that the use of current proposed object detection algorithms can be used to detect humans and the Euclidean distance method is successfully implemented together with the object detection algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…The result shows that with native programming on Android platform, even a complicated object detection algorithm can be done in real-time.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Reactive power imbalance method for islanding detection in micro-grid operation by Shamshiri, Meysam, Sapar, Ahmad Farid, Chin, Kim Gan, Tengga Daram, Revinnath, Ab Ghani, Mohd Ruddin

    Published 2014
    “…This paper presents and investigates the Reactive Power imbalance Method for islanding detection. The passive algorithm implements in this paper due to the low cost operation, however it got the higher non-detection zone (NDZ) and slower response time compare some active methods. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi by Mohd Pauzi, Mohd Farhan

    Published 2022
    “…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…This thesis provided a detailed method in implementing the algorithm for face and person recognition by using haar cascade classifier feature detection and contour approximation. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18
  19. 19

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2005
    “…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item