Search Results - (( safety implementation using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Car plate recognition system : (segmentation) by Nor Helmy Effendy, Meon

    Published 2005
    “…In the research,One Pass Thinning algorithm and Partial Segmentation algorithm are the algorithms being applied.For each phase,the used technique produces quite a good result whereby it is to be discussed in detail in the thesis.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…In Malaysia, this requirement is outlined in Standard Operation Procedure (SOP) manuals, which specify the mandatory use of seven types of PPE: hard hat, safety goggle, hi-vis vest, safety shoes, gloves, respirator, and earplugs. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    A pothole boundary detection algorithm using image segmentation technique in urban road by Mohd Shah, Hairol Nizam, Alshami, Abdallah M. M., Abdollah, Mohd Fairus, Ab Rashid, Mohd Zamzuri, Arshad, Mohd Ali

    Published 2025
    “…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Implementation Of Algorithm For Vehicle Anti-Collision Alert System In FPGA by Jidin, Aiman Zakwan, Lim, Siau Li, Kadmin, Ahmad Fauzan

    Published 2017
    “…This paper presents the development and implementation of an algorithm to be utilized for vehicle anti-collision alert system, which may be useful to reduce the occurrence of accidents. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  14. 14

    Real-time safety helmet detection using enhanced YOLOv5 object detection by Muhammad Zamri, Fatin Najihah, Zulkurnain, Nurul Fariza, Gunawan, Teddy Surya, Kartiwi, Mira, Md Yusoff, Nelidya, Nur, Levy Olivia

    Published 2023
    “…Extensive research was conducted to analyze all feasible algorithms that can be implemented in the safety helmet detection system and compare the proposed model with an existing one to ensure the proposed system can give high accuracy and high inference speed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman by Osman, Mohamad Shaiful

    Published 2010
    “…Our approaches ensure that algorithm and real-time control operations give safety requirements for the system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
    Get full text
    Get full text
    Thesis
  18. 18

    UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm by Wan Bejuri, Wan Mohd Ya'akob, Harun, Muhammad Harraz, Mohamad, Abdul Karim

    Published 2022
    “…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item