Search Results - (( messaging application interface algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks by Sheikh, Muhammad Aman, Drieberg , Micheal, Zain Ali, Noohul Basheer

    Published 2012
    “…To meet this challenge, we propose an Improved Distributed Scheduling Algorithm (IDSA), a novel scheduling technique that provides a flexible interface to obtain ultra low power operation, effective collision avoidance, minimum message overhead and high channel utilization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The communication between the processors was done via Message Passing Interface (MPI). The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…The algorithm for the RFID access and the security sensor was commercial software to control the microcontroller and interfacing circuits.…”
    Get full text
    Get full text
    Article