Search Results - (( verification implementation method algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Realization of a Hybrid Locally Connected Extreme Learning Machine with DeepID for Face Verification by Wong S.Y., Yap K.S., Zhai Q., Li X.

    Published 2023
    “…Backpropagation algorithms; Computation theory; Deep learning; Face recognition; Iterative methods; Knowledge acquisition; Machine learning; Neural networks; Biological learning; Convolutional neural network; DeepID; Extreme learning machine; Face Verification; Fast implementation; Feature mapping; Labeled faces in the wilds (LFW); Learning algorithms…”
    Article
  9. 9

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The results involve the verification of the proposed method and mathematical example using three (3) prime numbers. …”
    Get full text
    Get full text
    Student Project
  10. 10

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…Using this approach, experimental result provides, Total Success Rate (TSR) is 98.79%, False Acceptance Rate (FAR) is 3.21% and False Rejection Rate (FRR) is 0%. Since the proposed method requires very small computational time, the practical implementation requirement for a large number of person verification is possible.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…Thus a new technique is implemented in this paper in order to reduce the time consuming faced by the existing method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…In this paper, a finger vein recognition method has been implemented in which the effect on performance has of using principal components analysis has been investigated. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
    Get full text
    Get full text
    Thesis