Search Results - (( java implementation bat algorithm ) OR ( using message using algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Thesis
  5. 5

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each eight sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  9. 9

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi by Che Alhadi, Nazirah

    Published 2012
    “…This project is designed using negative selection algorithm to automatically classify the Twitter’s messages into its sentiment’s category based on important keyword recognition. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fast ZeroY algorithm for efficient message routing in optical multistage interconnection networks by Raja Mohd Auzar, Tengku Dian Shahida, Othman, Mohamed, Abdullah, Mohamad Khazani

    Published 2008
    “…In addition, the inverse Conflict Matrix (iCM) is used to map identified conflicts between messages in the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The use of people rank technique for data dissemination in opportunistic network by Donna, Christen George

    Published 2015
    “…The question is which forwarding algorithm offers the best balance between number of successful messages forwarded and the time it takes to forward the message. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Learning to Filter Text in Forum Malay Message using Naive Bayesian Technique by Ab. Halim, Norhadila

    Published 2006
    “…The paper explains about me use of the basic naive Bayesian algorithm to classify forum messages whether clean or bad where clean message has no bad words, while bad message contains at least one bad word. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Secret channel using video steganography by Lee, Kar Yee, Chuah, Chai Wen

    Published 2017
    “…OurSecret software only using simple password to keep the secrecy of the message. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Experimental analysis on the anti spam effectiveness - commercial, Bayesian and Ngram algortihm / Ahmad Kamal Ramli by Ramli, Ahmad Kamal

    Published 2008
    “…By using standard series of text messages which consists of spam and ham words, N-Gram algorithm performed very well. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A taxonomy for congestion control algorithms in vehicular ad hoc networks by Sattari, Mohammad Reza Jabbarpour, Noor, Rafidah Md, Keshavarz, Hassan

    Published 2012
    “…Safety messages encompass beacons and event-driven messages. …”
    Get full text
    Get full text
    Conference or Workshop Item