Search Results - (( java segmentation using algorithm ) OR ( using message _ algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  7. 7

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each eight sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Fast ZeroY algorithm for efficient message routing in optical multistage interconnection networks by Raja Mohd Auzar, Tengku Dian Shahida, Othman, Mohamed, Abdullah, Mohamad Khazani

    Published 2008
    “…In addition, the inverse Conflict Matrix (iCM) is used to map identified conflicts between messages in the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13

    The use of people rank technique for data dissemination in opportunistic network by Donna, Christen George

    Published 2015
    “…The question is which forwarding algorithm offers the best balance between number of successful messages forwarded and the time it takes to forward the message. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi by Che Alhadi, Nazirah

    Published 2012
    “…This project is designed using negative selection algorithm to automatically classify the Twitter’s messages into its sentiment’s category based on important keyword recognition. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A taxonomy for congestion control algorithms in vehicular ad hoc networks by Sattari, Mohammad Reza Jabbarpour, Noor, Rafidah Md, Keshavarz, Hassan

    Published 2012
    “…Safety messages encompass beacons and event-driven messages. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Learning to Filter Text in Forum Malay Message using Naive Bayesian Technique by Ab. Halim, Norhadila

    Published 2006
    “…The paper explains about me use of the basic naive Bayesian algorithm to classify forum messages whether clean or bad where clean message has no bad words, while bad message contains at least one bad word. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Experimental analysis on the anti spam effectiveness - commercial, Bayesian and Ngram algortihm / Ahmad Kamal Ramli by Ramli, Ahmad Kamal

    Published 2008
    “…By using standard series of text messages which consists of spam and ham words, N-Gram algorithm performed very well. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis