Search Results - (( pattern classification cell algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…A working classification algorithm is developed by using MATLAB and the Fuzzy Logic Toolbox to differentiate and classify the staining pattern of HEp-2 cell images. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    HEp-2 cell images classification based on statistical texture analysis and fuzzy logic by Jamil, N.F.B., Faye, I., May, Z.

    Published 2014
    “…This paper proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    MITOTIC HEp-2 CELL RECOGNITION USING LOCAL BINARY PATTERN (LBP) AND k-NEAREST NEIGHBOUR (k-NN) CLASSIFIER by Mahmod, Noor Fatihah

    Published 2014
    “…This work aims to highlight the features of mitotic cells and to develop recognition algorithm for mitotic cell by incorporated Local Binary Pattern (LBP) and k-Nearest Neighbour to classified unlabelled image. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…The algorithm tested on the publicly available Mivia Hep-2 Cell image dataset. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    HEP-2 CELL FEATURE EXTRACTION USING WAVELET AND INDEPENDENT COMPONENT ANALYSIS by NUR THANIA AWATIF BINTI MOHAMAD ROSDI, NUR THANIA AWATIF BINTI MOHAMAD ROSDI

    Published 2013
    “…Thus, this project will study on the technique to identify and classify the pattern of ANA automatically. Algorithms are created using MATLAB software and a Graphical User Interface (GUI) is generated for the algorithm to be easily used. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Modified Piecewise Linear Mapping Contrast Enhancement And Local Otsu Segmentation Methods For Hep-2 Cell Images by Baharom, Mohamad Shahrul Affendi

    Published 2019
    “…But, some structure of unnecessary cell accidently be removed such as small cell or damaged cell. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  16. 16

    FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES by MD HASIM, SITI MASTURA

    Published 2013
    “…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Resource competition part of AIRS poses another problem, here, premature memory cells are generated and therefore classification accuracy decreases. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    On equivalence of FIS and ELM for interpretable rule-based knowledge representation by Wong S.Y., Yap K.S., Yap H.J., Tan S.C., Chang S.W.

    Published 2023
    “…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
    Article