Search Results - (( java implementation rsa algorithm ) OR ( using iterative process algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes by Normah Abdullah, Brdys, M.A., Roberts, P.D.

    Published 1993
    “…The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
    Get full text
    Get full text
    Article
  10. 10

    Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography by Tian, Wenbin, Ramli, Mimi Faisyalini, Yang, Wuqiang, Sun, Jiangtao

    Published 2020
    “…The conclusions in this paper can be used for practical industrial processes, regarding the adaptive selection of relaxation factor and the number of iterations needed.…”
    Get full text
    Get full text
    Article
  11. 11

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…There have been various procedures suggested to date, whether through manual or automated selections, to choose the best model.This study nonetheless focuses on an automated selection for multiple equations model with the use of iterative estimation method. In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhance foreign body image using partitioned iterated function system (PIFS) in image enhancement technique / Hidayah Sharif by Sharif, Hidayah

    Published 2010
    “…This application used one of the image enhancement techniques which his Partitioned Iterated Function System (PIFS) algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Implementation of the Explicit Group Iterative Method for Solving Image Blurring Problem using Non-Linear Diffusion Equations by N A Basran, J H Eng, A Saudi, Jumat Bin Sulaiman

    Published 2018
    “…The solutions of diffusion equations were obtained using the iterative algorithms and thereafter applied in the image blurring processes. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Diagonal-Newton Fast Iterative Shrinkage-Thresholding Algorithm for solving linear inverse problems in image restoration by Sim, Hong Seng, Goh, Yong Kheng, Chua, Sing Yee, Leong, Wah June

    Published 2025
    “…The Fast Iterative Shrinkage-Thresholding Algorithm (FISTA) is widely used to solve inverse problems arising from various image processing applications. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Stereo Matching Algorithm Based On Per Pixel Difference Adjustment, Iterative Guided Filter And Graph Segmentation by Hamzah, Rostam Affendi, Ibrahim, Haidi, Abu Hassan, Anwar Hasni

    Published 2017
    “…Therefore, this paper proposes an improved algorithm to overcome these limitations. First, the proposed algorithm utilizes per-pixel difference adjustment for AD and gradient matching to reduce the radiometric distortions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Improved Fast Fuzzy C-Means Algorithm for Medical MR Images Segmentation by Li, Min, Huang, Tinglei, Zhu, Gangqiang

    Published 2008
    “…Fuzzy c-means (FCM) clustering algorithm has been widely used in automated image segmentation. …”
    Get full text
    Get full text
    Article
  19. 19

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…Artificial Bee Colony (ABC) algorithm is one of the methods used to solve the flowshop scheduling problem but only a few researches have been found using this method in this area. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20