Search Results - (( user estimation using algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development Of Eye Gaze Estimation System Using Two Cameras by Neoh , Yu Zun

    Published 2017
    “…Current researches uses infrared or LED to locate the iris of the user to have better gaze estimation accuracy compared to researches that does not. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Particle filter approach for tracking indoor user location using IEEE 802.11 signals by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Latiff , N. H. M.

    Published 2011
    “…This creates problem in tracking user location indoor. Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Estimating Depressive Tendencies Of Twitter User Via Social Media Data by Loh, Hooi Teng

    Published 2023
    “…We will use these three machine learning algorithms to compare the accuracy and performance of the depressed twitter user. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Estimation in spot welding parameters using genetic algorithm by Lukman, Hafizi

    Published 2007
    “…By using Genetic algorithm (GA) the spot welding parameters can be estimated.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Indoor location estimation utilizing Wi-Fi Signals by Hashim, Nik Mohd Zarifie, Zahari, Muhammad Khairul, Ja'afar, Abd Shukur, Salleh, Azahari, Darsono, Abd Majid

    Published 2020
    “…The study aim is to develop positioning and localization systems by using Wi-Fi signal. Estimation was made based on the measurement of wireless distance for estimation the user’s coordinates. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Trajectory planning and simulation for 3d printing process by Ng, Chin Yong

    Published 2022
    “…The output of slicing algorithm will be used as input of infill generator to generate infill vertices based on the infill density and infill pattern that decided by users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm by Ahmad, Azmi, Ali, Borhanuddin M., Khatun, Sabira, Hassan, Azmi

    Published 2005
    “…While near-far effect problem can be approach by applying power control, the MAI problem requires individual receiver to identify desired signal from interferences thus making multi-user detector a popular area of research. Genetic Algorithms (GA) is a search and optimizes technique that works by estimating multiple solutions in order to come with the best estimated solution. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  16. 16

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  17. 17

    Multi-observers of particle filter approach for estimating indoor mobile user location by Mantoro, Teddy, Ayu, Media Anugerah, Usino, Wendi, Raman, Shakiratul Husna, Md Latiff, Nurul Hidayati

    Published 2011
    “…Location-aware personal computing application can work accurately by estimating user location using IEEE 802.11 (Wi-Fi) signals in indoor environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…The capacity to reliably estimate a person's age using facial traits is critical in improving user experiences and security processes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2014
    “…With the increasing number of mobile users, which currently is estimated to be about 500million users by 2015 according to a study done by the Yankee Group in 2011, the main objective of this study is to review studies on mobile banking usability factors and graphical user authentication algorithms on the suitable algorithm to be adopted for mobile banking user authentication. …”
    Get full text
    Get full text
    Get full text
    Article