Search Results - (( visualization implementation towards algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…The current thesis is concerned with how biological systems solve the computational problem of visual pose estimation. Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    PID controller for unmanned aerial vehicle in closed environment using fiducial marker systems by Amiri, Mohammad Soleimani, Ramli, Rizauddin, Zaidi, I. E., Van, Mien

    Published 2024
    “…The aim of this paper is to develop an autonomous navigation algorithm for a UAV using a tag-based visual system. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Eye makeup system using interactive genetic algorithm by Chua,, Suk Ju.

    Published 2010
    “…Interaction is required for user to determine the fitness funct ions used in Genetic Algorithm. Implementation of the system shows the effectivenes s of the proposed system in generate eye makeup with colour that suit user pref erence.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Leader follower pattern formation control using ros for mobile robot application by Ahmad Hakimi, Hasnan

    Published 2022
    “…ROS will be used to be the main system in controlling the hardware and also to create a virtual environment, generate robot model called Turlebot and implement the algorithms such as SLAM. ROS provides some convenient packages with ROS node and the SLAM algorithms that make the formation problem easier to solve. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Computer aided system for dendritic cells detection and counting by Muhd Suberi, Anis Azwani

    Published 2017
    “…As DCs counting are crucial in most cancer treatment procedures, this research proposes a pioneering system called CasDC (Computer Aided System for Dendritic Cells identification) which implements an image processing algorithm to recognise and count DCs with a label-free method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Interval type-2 fuzzy logic control optimize by spiral dynamic algorithm for two-wheeled wheelchair by Nurul Fadzlina, Jamin

    Published 2020
    “…The completed model is then integrated with Matlab/Simulink for control design and performance evaluation through visualized simulations. The research has been compared to the previous controllers, Fuzzy Logic Control Type-1 (FLCT1), in gauging improvements and performance superiority. …”
    Get full text
    Get full text
    Thesis