Search Results - (( pre implementation function algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator by Mohd Ashraf, Ahmad, Mohd Zaidi, Mohd Tumari, Mohd Riduwan, Ghazali, Mohd Helmi, Suid

    Published 2022
    “…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…A data parallel algorithm (DPA-EHD) is designed and implemented for the EHD equations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…Hence, two transfer learning algorithms were proposed and implemented to provide initial performance boost to the River adaptive random forest regressor and classifier, respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…The results of the algorithm show significant improvement in comparison to a similar implementation of the hard c-means algorithm.…”
    Get full text
    Get full text
    Get full text
    Book Section
  11. 11

    Comparison Of Phylogenetic Trees Using Difference Distance Function Method by Maziah, Medin

    Published 2005
    “…The pre-processing is implemented using the Microsoft Visual C++. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Least Square QR Decomposition Method for Solving the Inverse Problem in Functional Near Infra-Red Spectroscopy by Hussain, A., Faye, I., Muthuvalu, M.S., Tong Boon, T.

    Published 2021
    “…For image reconstruction, the numerical algorithm for the LSQR method is created and implemented in MATLAB. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15
  16. 16

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Laser and vision sensing for obstacle avoidance and target seeking for a simple mobile robot by Akmeliawati, Rini, Demidenko, Serge, Menon, Anuradha

    Published 2009
    “…A localization system of the robot is based on progressive calculation and updating of global (world) and object coordinates. The system is implemented using inexpensive commodity hardware and employs simple but effective data processing software and control algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network by Pairan, Mohammad Fahmi

    Published 2018
    “…Recursive learning algorithms, such as Constant Trace (CT) can be implemented to solve insufficient training data and over-fitting problems by developing a new model from real-time flight data in each time step. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…MATLAB Simulink simulation was utilized to model and validate the FLC before hardware implementation. The simulation was performed to model and validate the FLC with comparing the standards function that is triangular and trapezoidal MFs to determine optimal performance. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…As known by them, GOA is an ongoing process and protein normally executes a variety of functions in different processes, so with the implementation of PFP(), they have increased the chances of finding matching function annotation for the first rule in the filtration process as much as 20%. …”
    Get full text
    Get full text
    Monograph