Search Results - (( developing email system algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…In order to increase the functionalities for the email application and further enhance the user experien ce, it is proposed to develop a recommendation system to work with the email application that provide s a recommendation based on the email content. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3
  4. 4

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Early detection for server availability in University Malaya data center / Mohd Azizi Osman by Osman, Mohd Azizi

    Published 2016
    “…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo by Ibrahim Teo, Noor Hasimah

    Published 2005
    “…A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…This project focuses on developing machine learning-based applications to enhance cybersecurity, specifically the Spear Phishing Attack Detection (S.P.A.D) system and the Email/SMS Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14
  15. 15

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Securing password transmission for FTMSK webmail system using cryptographic hashing / Prasanna Ramakrisnan ... [et al.] by Ramakrisnan, Prasanna, Md Daud, Md Rosli, Jono, Mohd Nor Hajar Hasrol, Abdul Aziz, Azlan

    Published 2007
    “…This method is widely used in many online systems and email systems. This method ensures that only the legitimate users have access to the system. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Secured HF image transmission system by Shameri, Ahmad Zuri

    Published 2006
    “…Communications is no longer limited to voice and telegraphy, but now include applications such as email, text messaging, image, and telemetry. This project looks into the design and development of an image transmission system that for use in the HF radio frequency spectrum. …”
    Get full text
    Get full text
    Monograph