Search Results - (( developing messaging application algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  5. 5

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  9. 9

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. Nowadays, people are more likely to communicate with each other through mobile application. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  15. 15
  16. 16
  17. 17

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20