Search Results - (( parameter extraction search algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…To overcome these ANN problems, the Genetic Algorithm (GA) has been most frequently used for this purpose, however, some drawbacks of GA include, slow search speed and dependence on initial parameters. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review by Goh, Choon-Hian, Ferdowsi, Mahbuba, Gan, Ming Hong, Kwan, Ban-How, Lim, Wei Yin, Tee, Yee Kai, Rosli, Roshaslina, Tan, Maw Pin *

    Published 2024
    “…Selected studies must use ML algorithms in syncope detection with hemodynamic parameters recorded throughout HUTT. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…Furthermore, a systematic feature selection approach was proposed in which search algorithms (Ant-Search, Best First-Search and Particle Swamp Optimization (PSO) - Search) performance were evaluated to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The adaptive technique for ant selection enables the parameter to adaptively change based on the feedback of the search space. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…To do this, at first, based on the proposed algorithm,the physiological dimensions of leaves are automatically measured and with regard to these parameters, specified features such as shape, morph, texture and colour are extracted from the image of the plant leaf through image processing to create a reserved feature database to be used for different species of plants. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…All benign files are then scanned through VirusTotal to ensure that all collected files are free from virus. On extracting the desired features, a new automation of feature extraction using Depth First Search (DFS) with sequential search are introduced and succeed to extract the targeted features with consideration of no limitation on application file size also no limitation on file number. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Video abstraction using density-based clustering algorithm by Chamasemani, Fereshteh Falah, Affendey, Lilly Suriani, Mustapha, Norwati, Khalid, Fatimah

    Published 2017
    “…Utilizing fusion and the DENCLUE algorithm resulted in the extraction of more informative parts of the videos and increased the robustness of the proposed approach to handle large-scale and noisy videos with no further tuning of the input parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Modeling of vehicle trajectory using K-means and fuzzy C-means clustering by Choong, Mei Yeen, Lorita Angeline, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2019
    “…Hence, the clustering of vehicle trajectory dataset for similar patterns identification is implemented with k-means and fuzzy c-means (FCM) clustering algorithm. As these clustering algorithms require the number of clusters as input parameter of the algorithms, the study of number of clusters for the clustering is served as focus in this paper. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  18. 18

    Model of Bayesian tangent eye shape for eye capture by Nsaef, Asama Kuder, Jaafar, Azizah, Sliman, Layth, Sulaiman, Riza, O. K. Rahmat, Rahmita Wirza

    Published 2014
    “…Owing to maximum a posteriori estimation, we can identify similarity transform coefficients as well as the eye shape parameters in BTESM. To apply the maximum a posteriori procedure, tangent Eye shape vector was considered the state of the model which is hidden and expectation maximization depending on searching algorithm was adopted. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Evaluation of genetic algorithm based solar tracking system for photovoltaic panels by Mashohor, Syamsiah, Samsudin, Khairulmizam, M. Noor, Amirullah, A. Rahman, Adi Razlan

    Published 2008
    “…In this paper, a genetic algorithm (GA) has been proposed utilizing sun tracking approaches to maximize the performance of PV panels. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Statistical Approach for Image Retrieval by Khor, Siak Wang

    Published 2007
    “…This persistent trend has demanded a more sophisticated search algorithm on these images. One of the popular and common approaches for image search is Content-based Image Retrieval or CBIR for short, i.e. retrieval of images based on their visual contents such as shapes, colours, textures etc. …”
    Get full text
    Get full text
    Thesis