Search Results - (( developing messaging system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing messaging »
- messaging system »
- system algorithm »
- java application »
- using algorithm »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Network monopoly / Tan Kean Yeap
Published 2002“…The Network solution applies in this game system permits only low level of communication, particulary of sending and receiving limited amount of messages within network. …”
Get full text
Get full text
Thesis -
5
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
Get full text
Get full text
Conference or Workshop Item -
7
Statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Get full text
Article -
8
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
9
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
10
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
11
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Conference or Workshop Item -
12
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
13
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
14
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024“…The unique and complex of Biology Immune System (BIS) gives inspiration to scientists to develop new theory in computational area known as the Artificial Immune System (AIS), and this theory uses by researchers to solve real world problems. …”
Proceedings Paper -
15
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article -
16
-
17
Genetic algorithm for event scheduling system
Published 2010“…Ozeki Messager 6 are installed and configured for this system to operate with its SMS function. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
Indoor parking location information through Short Message Service (SMS) / Nurul Hidayu Abdul Aziz
Published 2010“…Indoor Parking Location Information through Short Message Service (SMS) is developing to help the drivers to find back their vehicle using their mobile phone via text messaging technology. …”
Get full text
Get full text
Thesis
