Search Results - (( java application rsa algorithm ) OR ( variable estimation matching algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…There are many types of motion estimation method but the most used method is the block matching method which is the fixed block matching and the variable block matching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of an explainable machine learning model for predicting depression in adults with type 2 diabetes mellitus: a cross-sectional SHAP-based analysis of NHANES 2009-2023 by Tang, Yan, Jia, Lei, Zhou, Junjun, Dou, Jin, Qian, Jingjuan, Yi, Xin, Soh, Kim Lam

    Published 2026
    “…A streamlined XGBoost model incorporating only these 10 variables achieved an area under the curve of 0.886, closely matching the predictive capability of the full model. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Several techniques have been proposed in the past decade, particularly error concealment (EC) algorithms. In this study, attention is focused on the algorithms that have high efficiency to fill-in the damaged patches, for example, Multi-directional interpolation (MDI), neighboring matching EC, etc. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis by Adnani, Seyedeh Atena

    Published 2011
    “…Optimal condition derived from Taguchi method showed that, the method couldreduce reaction time, molecular sieve amount and enzyme amount with high conversion (96%, 92%, 88% for xylitol stearate, xylitol palmitate, and xylitol caprate, respectively) compared to conventional one variable at a time approach. Artificial Neural Network (ANN) method was also employed for the estimation of esterification yield in enzymatic synthesis of xylitol esters. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling and control strategies for hydrokinetic energy harnessing by Wan Ismail, Ibrahim

    Published 2020
    “…Subsequently, the metaheuristic method based on the combination of the Hill-Climbing Search (HCS) MPPT algorithm and the Fuzzy Logic Controller has been proposed to produce a variable step size compared to the fixed step size in conventional HCS algorithm. …”
    Get full text
    Get full text
    Thesis