Search Results - (( messaging application server algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- messaging application »
- application testing »
- application server »
- testing algorithm »
- server algorithm »
- java application »
-
1
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
4
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
5
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. …”
Get full text
Get full text
Get full text
Proceeding -
6
-
7
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
Get full text
Get full text
Thesis -
8
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007Get full text
Get full text
Research Reports -
11
Performance analysis of Message Passing Interface collective communication on intel xeon quad-core gigabit ethernet and infiniband clusters
Published 2013“…However, InfiniBand provides the lowest latency for all operations since it provides applications with an easy to use messaging service, compared to Gigabit Ethernet, which still requests the operating system for access to one of the server communication resources with the complex dance between an application and a network. …”
Get full text
Get full text
Get full text
Article -
12
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
13
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
14
-
15
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…In an email application, it's utilized to ensure the privacy and authenticity of email message. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
17
-
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
Get full text
Get full text
Student Project -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
