Search Results - (( java implementation _ algorithm ) OR ( using message ((data algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multipath routing protocol based on cross-layer approach for MANET by Allahham, Alaa Azmi, Mohammed, Muamer N., Kadhim, Nassir Sallom

    Published 2017
    “…The CTMRP is designed for decision maker based on threshold value of average paths signal for efficient transmission of the Text, image, audio and video as well as sending the data via multiple paths, which mitigate the negatives effects causes from forcing the nodes to send the data via single. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…Each of these nodes is connected to each other through interconnection networks and passes message using a standard message passing mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…To overcome this problem, vehicles can be used as carriers to deliver messages using store-and-carry forwarding whenever forwarding option via wireless transmission is not available. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2015
    “…To overcome this problem, vehicles can be used as carriers to deliver messages using store-and-carry forwarding whenever forwarding option via wireless transmission is not available. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    STITCH-256: A dedicated cryptographic hash function by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.

    Published 2023
    “…Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
    Article
  18. 18

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis