Search Results - (( parallel segmentation using algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…Then, segmentation technique consisting of Difference of Gaussian and threshold are used to segment the veins. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Drone Based Image Processing For Precision Agriculture by Sharif, Muhammad Arif Syafiq Md

    Published 2019
    “…This study proposes a parallel image segmentation algorithm in order to detect the diseased leaf in Coconut, Palm, Banana, Dwarf Palmetto and Sapodilla plants acquire using Parrot PF728000 Anafi Drone with 4K HDR Camera. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Speeding up index construction with GPU for DNA data sequences by Rahmaddiansyah, , Abdul Rashid, Nur’aini

    Published 2011
    “…Graphic processor unit (GPU) is used to parallelize a segment of an indexing algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Real-time Rotation Invariant Hand Tracking Using 3D Data by Rosdiyana, Samad, M. Zabri, Abu Bakar, Pebrianti, Dwi, Nicolaas Lim, Yong Aan

    Published 2014
    “…This paper proposes hand tracking method using hand tracker algorithm released by NiTE, hand’s segmentation method, hand contour detection and center of palm detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
    Get full text
    Get full text
    Book Section
  13. 13

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…Meanwhile, part two presents three developed control methods for FLC from the improvement of fuzzy control (named as scaled fuzzy using PSO, parallel conventional PI/PD with Scaled Fuzzy PI/PD and Mirror Fuzzy controller) by adapting the utilization of PSO to optimize the scaled gain of fuzzy controllers. …”
    Get full text
    Get full text
    Thesis
  16. 16