Search Results - (( shape identification system algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Human identification at a distance using body shape information by Alang Md Rashid, Nahrul Khair, Yahya, M. F., Shafie, Amir Akramin

    Published 2013
    “…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
    Get full text
    Get full text
    Proceeding
  10. 10
  11. 11

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Experiment for comparison between manual process identification by experts with automated recognition process performed by system. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Vision-based flame analysis using motion and Edge Detection by Razmi, Suzilawati Mohd, Saad, Nordin, Asirvadam, Vijanth Sagayan

    Published 2010
    “…System identification will be used to obtain a process model of the flame. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Edge link detector based weed classifier by M.H., Siddiqi, I., Ahmad, S., Sulaiman

    Published 2009
    “…To automate these activities, like in shape, color and texture, weed control system is feasible. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Bacteria identification via Artificial Neural Network based-on Bergey’s manual by Ruhaimi, Amirul Hafiiz

    Published 2017
    “…Due to limitations and disadvantages of current identification process of unknown bacteria, artificial neural network can be employed as an alternative technique in bacteria identification at low cost and less time consuming. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Application of artificial neural network in bacteria identification based on Bergey’s manual: Hydrogenophilaceae family: article by Ruhaimi, Amirul Hafiiz, Ahmad, Normadyzah, Husin, Hazlina, Mohamad Pauzi, Syazana

    Published 2017
    “…Due to limitations and disadvantages of current identification process of unknown bacteria, artificial neural network can be employed as an alternative technique in bacteria identification at low cost and less time consuming. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…In this chapter, features have been extracted from hand posture closed contours, hand posture trajectory and hand position has been identifIed. Algorithms have been developed for extracting these features after segmenting the head and the two hands. …”
    Get full text
    Get full text
    Get full text
    Book Chapter