Search Results - (( program among normalization algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The baths exhibit the normal features of an industrial system such as nonlinear dynamics and multi-effects among variables. …”
    Get full text
    Get full text
    Article
  8. 8

    Development of MATLAB® GUI for infant cry signal analysis using FFT / Suzilawati Muhamud @ Kayat by Muhamud @ Kayat, Suzilawati

    Published 2008
    “…FFT analysis and Hilbert transformation were used to extract information embedded in both cry signals Algorithms and programming utilizing MATLAB R2007b were written to search for the fundamental frequency of each cry signal and to identify the type of signal uniquely according to its fundamental frequency. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection by Eustacius Jude, Anak Joseph Linggong

    Published 2019
    “…Brain tumour is among the deadliest disease that is fatal if left untreated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Analyzing the cost-effectiveness of enhancement approaches for rehabilitating water distribution network by Abdel Rahman Mohamed Ismail, Farouk Abdel Mageed Rady

    Published 2021
    “…Then, Cronbach’s alpha, mean score ranking, normalization value, and agreement analysis were carried in the data analysis phase. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Flash crowd attack is the most challenging problem among the attacks which targeting the web server during the Flash Events (FEs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item