Search Results - (( java implementation rsa algorithm ) OR ( using ((coding using) OR (sensing using)) algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Speech compression using compressive sensing on a multicore system by Gunawan, Teddy Surya, Khalifa, Othman Omran, Shafie, Amir Akramin, Ambikairajah, Eliathamby

    Published 2011
    “…Compressive sensing is a new paradigm of acquiring signals, fundamentally different from uniform rate digitization followed by compression, often used for transmission or storage. …”
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…In this paper, Quick Response Code (QR code) and EAN-13 barcode was used to enhancing the previous work. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Algorithm analyzer to check the efficiency of codes by Arvaree @ Alvar, Thamilvaani, Atan, Rodziah

    Published 2011
    “…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Simplified VHDL Coding of Modified Non-Restoring Square Root Calculator by Jidin, Auzani

    Published 2012
    “…The main principle of the method is similar with conventional non-restoring algorithm, but it only uses subtract operation and append 01, while add operation and append 11 is not used. …”
    Get full text
    Get full text
    Article
  11. 11

    Evaluation of sparsifying algorithms for speech signals by Kassim, Liban A., Khalifa, Othman Omran, Gunawan, Teddy Surya

    Published 2012
    “…It has also played an important role in compressive sensing algorithms since it performs well in sparse signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping by Ahmed Asal Kzar, Ahmed Asal Kzar, M Jafri, Mohd Zubir, Mutter, Kussay N., Anwar, Saumi Syahreza

    Published 2016
    “…In this work, a Modified Hopfield Neural Network Algorithm (MHNNA) was used with remote sensing imagery to classify the total suspended solids (TSS) concentrations in the waters of coastal Langkawi Island, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Parallelization Of CCSDS Hyperspectral Image Compression Using C++ by Tan, Lit Chez

    Published 2018
    “…Next, the parallelizable section of the algorithm is identified and coded using OpenMP. The algorithm has been parallelized by dividing the bands of the hyperspectral image into several continuous chunks and running them concurrently. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…This study focuses on using Python for remote sensing data analysis to identify and classify healthy crops. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network by Usman, I. H., Nordin, N. K., Omizegba, E. E., Sali, A., Rasid, M. F. A., Hashim, F.

    Published 2021
    “…The aspect of spectrum or carrier aggregation uses cognitive radio technology that implements the dynamic spectrum access for spectrum utilization by sensing and using the underutilized spectrum on co-primary basis without interference to the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Comparative study on satellite base air monitoring system / Norsyuhaimy Abdul Shukor by Abdul Shukor, Norsyuhaimy

    Published 2010
    “…The atmospheric reflectance values were later used for PMIO mapping using the calibrated algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparative study on satellite base air monitoring system / Norsyuhaimy Abdul Shukor by Abdul Shukor, Norsyuhaimy

    “…The atmospheric reflectance values were later used for PM10 mapping using the calibrated algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek by Miskon, Mohamad Taib, Jantan, Hamidah, Wan Chek, Wan Ahmad Khusairi

    Published 2016
    “…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
    Get full text
    Get full text
    Research Reports