Search Results - (( based application warping algorithms ) OR ( web application rsa algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Hybrid shear-warp rendering by Zakaria, Mohamed Nordin, Selvanathan, N.

    Published 1999
    “…Shear-warp rendering is a fast and efficient method for visualizing a volume of sampled data based on a factorization of the viewing transformation into a shear and a warp. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Geometry based lip reading system using Multi Dimension Dynamic Time Warping by M. Z., Ibrahim, Mulvaney, D. J.

    Published 2012
    “…Lip geometry features including height, width, ratio, area, perimeter and various combinations of these features were evaluated to determine which performs the best when representing speech in the visual domain in the application of three separate classification methods, namely optical flow, Dynamic Time Warping (DTW) and a new approach termed Multi-Dimensional DTW. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…Voice recognition systems have become the important applications for speech recognition technology. In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…Voice recognition systems have become the important applications for speech recognition technology. In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Stereo matching algorithm using deep learning and edge-preserving filter for machine vision by Abd Gani, Shamsul Fakhar, Miskon, Muhammad Fahmi, Hamzah, Rostam Affendi, Hamid, Mohd Saad, Kadmin, Ahmad Fauzan, Herman, Adi Irwan

    Published 2024
    “…This paper proposes a hybrid method of a stereo matching algorithm with the goal of generating an accurate disparity map critical for applications such as 3D surface reconstruction and robot navigation to name a few. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Vision-based dynamic hand gesture recognition techniques and applications: A review by Nurfazlin Muhamad Feizal Franslin, Ng, Giap Weng

    Published 2022
    “…The applications that are used in vision-based dynamic hand gesture recognition are presented.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20