Search Results - (( processes specification max algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Lambda-max criteria weight determination in an adaptive neuro-fuzzy inference system / Rosma Mohd Dom, Daud Mohamad and Ajab Bai Akbarally by Mohd Dom, Rosma, Mohamad, Daud, Akbarally, Ajab Bai

    Published 2012
    “…A neuro-fuzzy system is a fuzzy system that uses learning algorithms derived from or inspired by neural network theory to determine its parameters (fuzzy sets and fuzzy rules) by processing data samples. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…Each sensor node is responsible for collecting specific data and transmitting it to the processing center. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The effect of data preprocessing on the performance of artificial neural networks techniques for classification problems by Atomi, Walid Hasen

    Published 2012
    “…Specifically Min-Max, Z-Score and Decimal Scaling Normalization preprocessing techniques were evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…Face anti-spoofing is a revolutionary technology involved in various aspects of daily life. Specifically, facial anti-spoofing is a detection process that involves using printed or even keepsakes to mimic genuine facial appearances, and it is related to the facial detection application. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Automated plaque classification using computed tomography angiography and Gabor transformations by Acharya, U. Rajendra, Meiburger, Kristen Mariko, Wei Koh, Joel En, Vicnesh, Jahmunah, Ciaccio, Edward J., Shu Lih, Oh, Tan, Sock Keow, Raja Aman, Raja Rizal Azman, Molinari, Filippo, Ng, Kwan Hoong

    Published 2019
    “…The automated technique is based on various features that are extracted from the Gabor transform of the acquired CTA images. Specifically, seven features are extracted from the Gabor coefficients: energy, and Kapur, Max, Rényi, Shannon, Vajda, and Yager entropies. …”
    Get full text
    Get full text
    Article
  15. 15

    Lysine and methionine production from agro-waste submerged fermentation using locally isolated lactic acid bacteria by Muhamad Nor, Norfarina

    Published 2016
    “…Prediction of ANN models indicated that using molasses (10.02 g/L), fish meal (18 g/L), glutamic acid (1.17 g/L) and initial medium pH (4.26) was the greatest combination.The cultivation of P. pentosaceus RF-1 for lysine-methionine productions was carried out in 2 L stirred-tank bioreactor using batch and continuous mode of operations. The maximum specific growth rate (μmax) of 0.306 h-1 was obtained during the batch cultivation process. …”
    Get full text
    Get full text
    Get full text
    Thesis