Search Results - (( bubble detection method algorithm ) OR ( digital communication between algorithm ))

Refine Results
  1. 1
  2. 2

    Charge coupled device based on optical tomography system in detecting air bubbles in crystal clear water by Juliza Jamaludin, Rahim, RA, Rahim, HA, Rahiman, MHF, Muji, SZM, Rohani, JM

    Published 2024
    “…Experiments in detecting moving air bubbles are conducted. The images of captured data are reconstructed based on filtered image of Linear Back Projection with Hybrid algorithms. …”
    Article
  3. 3
  4. 4

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…Email is the most important communications system in the world. However the internet traffic between the sender and recipient is routed through many countries, even they live on the same area and the content of email messages are generally not encrypted and unsecured. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi by Rozi, Muhammad Faris Fakhri, Ismail, Alya Syuhada, Suhaimi, Emylia

    Published 2018
    “…Elliptic Curve Digital Signature Algorithms (ECDSA) is implemented in Station-To¬ Station protocol in order to give an improvement in the secret key exchange between two parties. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water by Juliza Jamaludin, Rahim, RA, Rahim, HBA, Rahiman, MHF, Rohani, JM, Muji, SZBM

    Published 2024
    “…Experiments in detecting static solid, transparent objects and moving air bubbles are conducted. …”
    Article
  7. 7
  8. 8

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13
  14. 14

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol.…”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19
  20. 20

    A review on multimedia communications cryptography by Salem, Yasser, Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan, Aos Alaa, Zaidan, Bilal Bahaa

    Published 2011
    “…It is a comparative study between symmetric key encryption and asymmetric key encryption in achieving an efficient, flexible and secure video data…”
    Get full text
    Get full text
    Get full text
    Article