Search Results - (( _ equalization based algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Garbage truck staff duty roster using genetic algorithm / Nadea Suneeza Zulkifli by Zulkifli, Nadea Suneeza

    Published 2017
    “…Experimental result shows that my three-dimensional array staffscheduling implementation based on the best problem solution of the minimum violated working time of each staff works for 28 days equally to avoid overpay.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem by Sultana, Tanzima, Akhand, Md Aminul Haque, Rahman, M.M. Hafizur

    Published 2017
    “…Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    Selective harmonic elimination in multilevel inverter using hybrid APSO algorithm by Memon, Mudasir Ahmed, Mekhilef, Saad, Mubin, Marizan

    Published 2018
    “…The proposed algorithm is applicable to all levels of MLI having equal and non-equal DC sources. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…The quality of the watermarked images is considered as one of the most important requirements of any watermarking system.In most applications, the watermarking algorithm embeds the watermark without affecting the quality of the host media.In this study, a comparison of watermarking image quality was performed between two existing methods: Dual Intermediate Significant Bit (DISB) an d Genetic Algorithm (GA).The first method focuses on the high quality of the watermarked image based on DISB model and this method requires embedding two bits into every pixel of the original image, while the other six bits are modified so as to immediately assimilate the original pixel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
    Get full text
    Get full text
    Thesis