Search Results - (( program among normalization algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- normalization algorithm »
- among normalization »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Immune Log-Normal Evolutionary Programming (ILNEP) for solving economic dispatch problem with prohibited operating zones
Published 2023Conference Paper -
7
Neural network based model predictive control for a steel pickling process
Published 2009“…The baths exhibit the normal features of an industrial system such as nonlinear dynamics and multi-effects among variables. …”
Get full text
Get full text
Article -
8
Development of MATLAB® GUI for infant cry signal analysis using FFT / Suzilawati Muhamud @ Kayat
Published 2008“…FFT analysis and Hilbert transformation were used to extract information embedded in both cry signals Algorithms and programming utilizing MATLAB R2007b were written to search for the fundamental frequency of each cry signal and to identify the type of signal uniquely according to its fundamental frequency. …”
Get full text
Get full text
Thesis -
9
Heartbeat disease diagnosis using text-based approaches
Published 2011Get full text
Get full text
Thesis -
10
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection
Published 2019“…Brain tumour is among the deadliest disease that is fatal if left untreated. …”
Get full text
Get full text
Get full text
Thesis -
14
Analyzing the cost-effectiveness of enhancement approaches for rehabilitating water distribution network
Published 2021“…Then, Cronbach’s alpha, mean score ranking, normalization value, and agreement analysis were carried in the data analysis phase. …”
Get full text
Get full text
Thesis -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Flash crowd attack is the most challenging problem among the attacks which targeting the web server during the Flash Events (FEs). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
