Search Results - (( java implementation rsa algorithm ) OR ( using ((complex using) OR (samples using)) algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…In addition, the output Signal to Interference Ratio (SIR) using the proposed algorithm has been doubled compared to NLMS and RLS algorithms.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm by Goay, Chan Hong

    Published 2019
    “…This work proposes an improvement to the original adaptive sampling algorithm and uses it as the sampling method for eye diagram modeling. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Evolutionary deep belief networks with bootstrap sampling for imbalanced class datasets by Amri, A’inur A’fifah, Ismail, Amelia Ritahani, Mohammad, Omar Abdelaziz

    Published 2019
    “…However, when handling imbalanced class data, DBN encounters low performance as other machine learning algorithms. In this paper, the genetic algorithm (GA) and bootstrap sampling are incorporated into DBN to lessen the drawbacks occurs when imbalanced class datasets are used. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Face recognition using integrated discrete cosine transform and kernel fisher discriminant analysis by Janahiraman T.V., Omar J., Farukh H.N.

    Published 2023
    “…The DCT has the capability to compact the energy in an image and let the dimensionality of the input sample space to be reduced. Then, KFDA, a new variant of FLD, will be used to extract the most discriminating feature. …”
    Conference paper
  10. 10

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The methodology is proposed as stacking ensemble ML and the best ML algorithms are used as a base learner to compute relative feature weights. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Real-time shadow casting using fake soft shadow volume with stencil buffer by Lee, Kong Weng

    Published 2006
    “…The algorithm is implemented using C++ and OpenGL where the occluders are ranging from simple to complex objects. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…The proposed data store management technique is combined with the central finite difference based gradient estimate to generate a model robust against both correlated data and irregular sampled data. Three nonlinear dynarnical test cases are used as a benchmark in this thesis which is single, split level and V-shape tanks system with varying complexity and correlation level to provide suitable testing conditions.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance Measurement on Deep Spiking Neural Network (DSNN) Algorithm in Flood Prediction Environment by Roselind, Tei

    Published 2023
    “…There are several algorithms used to predict floods, including LSTM, BP, MLP, SARIMA, and SVM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Real-Time Deterministic Peak Hopping Maximum Power Point Tracking Algorithm for Complex Partial Shading Condition by Koh J.S., Tan R.H.G., Lim W.H., Tan N.M.L.

    Published 2025
    “…A new deterministic peak hopping (PH)-based MPPT algorithm with simple mechanisms is proposed to address these complex PSCs. …”
    Article
  16. 16

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…The segmentation of brain MRI images is a challenging and complex task, due to noise and inhomogeneity. The Gaussian Mixture Model (GMM) is a clustering algorithm that is commonly used for brain MRI segmentation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Pixel-based skin color detection technique by Zaqout, I., Zainuddin, R., Baba, S.

    Published 2005
    “…In this paper we have used a simple and efficient color-based approach to segment human skin pixels from complex background, using a 2-D histogram-based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    An FPGA based embedded vision system for real-time motion detection by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw

    Published 2015
    “…Due to its paramount importance for background subtraction algorithms to disregard unimportant movements such as camera jitter and tree branches, a multi model sigma delta algorithm was used. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Image Analysis of Sludge Aggregates in Palm Oil Mill Effluent (POME) by Rizal Song, Ian Norman

    Published 2015
    “…Thus, this algorithm can be used to identify bulking problems in the POME and establish the true nature of the phenomenon occurring inside the activated sludge system which normally will affect the quality of the effluent…”
    Get full text
    Get full text
    Final Year Project