Search Results - (( developing email system algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing email »
- system algorithm »
- java implication »
- email system »
-
1
Context aware app recommendation using email semantic analysis
Published 2019“…In order to increase the functionalities for the email application and further enhance the user experien ce, it is proposed to develop a recommendation system to work with the email application that provide s a recommendation based on the email content. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…Email is the most important communications system in the world. …”
Get full text
Get full text
Thesis -
3
-
4
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
5
-
6
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
7
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
Get full text
Get full text
Thesis -
8
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
Get full text
Get full text
Final Year Project -
10
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
Get full text
Get full text
Thesis -
11
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
12
Spear- phishing attack detection using artificial intelligence
Published 2024“…This project focuses on developing machine learning-based applications to enhance cybersecurity, specifically the Spear Phishing Attack Detection (S.P.A.D) system and the Email/SMS Classifier. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
-
15
A security payment model for financial payment using mykad
Published 2011“…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Securing password transmission for FTMSK webmail system using cryptographic hashing / Prasanna Ramakrisnan ... [et al.]
Published 2007“…This method is widely used in many online systems and email systems. This method ensures that only the legitimate users have access to the system. …”
Get full text
Get full text
Article -
18
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…Finally, the system is being developed in the Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
19
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…Finally, the system is being developed in the Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
20
Secured HF image transmission system
Published 2006“…Communications is no longer limited to voice and telegraphy, but now include applications such as email, text messaging, image, and telemetry. This project looks into the design and development of an image transmission system that for use in the HF radio frequency spectrum. …”
Get full text
Get full text
Monograph
