Search Results - (( using factorization matching algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Selection of prospective workers using profile matching algorithm on crowdsourcing platform by Cucus, Ahmad, Aji, Luhur Bayu, Al Fahim, Mubarak Ali, Aminuddin, Afrig, Farida, Lilis Dwi

    Published 2022
    “…The criteria used to find a match between workers and the work offered consist of two parts, core factors and secondary factors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Stereo Matching Algorithm Based On Per Pixel Difference Adjustment, Iterative Guided Filter And Graph Segmentation by Hamzah, Rostam Affendi, Ibrahim, Haidi, Abu Hassan, Anwar Hasni

    Published 2017
    “…Stereo matching process is a difficult and challenging task due to many uncontrollable factors that affect the results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…The proposed SVDM algorithm involves four stages which starts from matching cost computation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Car License Plate Recognition by Using Template Matching Algorithm by Arina, Yusuf, Asrani, Lit, Annisa, Jamali

    Published 2014
    “…CLPR is developed to recognise the car license plate with the implementation of Digital Image Processing (DIP) and Template Matching Algorithm (TMA) approach by using the MATLAB software. …”
    Get full text
    Get full text
    Book
  10. 10

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment by Aqel, Mohammad O. A.

    Published 2016
    “…The maximum allowable vehicle speed for the developed VO is up to 6.3 m/s.In short, the developed VO system, as well as the proposed algorithms and techniques, were successfully implemented, tested, and validated using real time kinematic GPS (RTK-GPS) with 2 cm positioning accuracy. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Face recognition door lock system / Danial Haziq Hakimi Salahuddin by Salahuddin, Danial Haziq Hakimi

    Published 2023
    “…The camera captures the face of the person approaching the door, and the captured image is processed using facial recognition algorithms to match it against a preregistered database of authorized users. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Job Matching Mobile Application using Fuzzy Analytic Hierarchy Process (FAHP) / Mohammad Ashraf Jefrizin by Jefrizin, Mohammad Ashraf

    Published 2017
    “…Findings of this project is portrayed as conceptual framework that consists the structure of job matching mobile application using FAHP algorithm. Evaluation is conducted using accuracy test where the result of this application is compared to the manual method using a survey. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Concept Based Lattice Mining (CBLM) using Formal Concept Analysis (FCA) for text mining by Mumtazimah, Mohamad, Hassan, H., Mohd Saman, M.Y, Abdullah, Z.

    Published 2019
    “…Extracting relevant resources according to a query is imperative due to the factors of time and accuracy. This study proposes a model that enables query matching using output lattices from Formal Concept Analysis (FCA) tool, based on Graph Theory. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Assisted History Matching by Using Recursive Least Square and Discrete Cosine Transform by Abu Talib, Muhammad Ashraf

    Published 2014
    “…Because of these factors, manual history matching technique consume a lot of time. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Concept Based Lattice Mining (CLBM) Using Formal Concept Analysis (FCA) for Text Mining by Hasni, Hassan, Mumtazimah, Mohamad, Md Yazid, Mohamad Saman

    Published 2019
    “…Extracting relevant resources according to a query is imperative due to the factors of time and accuracy. This study proposes a model that enables query matching using output lattices from Formal Concept Analysis (FCA) tool, based on Graph Theory. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis