Search Results - (( java segmentation using algorithm ) OR ( using code ((rsa algorithm) OR (based algorithm)) ))
Search alternatives:
- java segmentation »
- using algorithm »
- rsa algorithm »
- using code »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The optimization on ANPR was performed on the pre-processing step using our own Java code as currently there is no image processing library available on the standard Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
5
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
6
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The effective lossless compression method, effective data structure, and DNA (Deoxyribonucleic Acid) data searching are quite essential as they provide a stimulus to easy accessibility and communication. The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
7
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
8
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
9
Simulation of quantum growing network / Ong Boon Teong
Published 2003“…Should it be possible to build a microprocessor which fully exploits quantum mechanics then it may be possible to carry out such factorisations in remarkably less time. The RSA algorithm, a widely used encryption system, is safe only if such factorisations cannot be performed quickly. …”
Get full text
Get full text
Thesis -
10
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
12
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
13
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
14
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Monograph -
15
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
16
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
17
Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity
Published 2018“…The algorithm that includes encoding and decoding processes is based on the red, green, and blue (RGB) colour techniques, which are used to create high capacity coloured QR code. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
19
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
Get full text
Get full text
Get full text
Thesis -
20
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis
