Search Results - (( messaging application testing algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
    thesis::doctoral thesis
  8. 8

    RSA algorithm performance in short messaging system exchange environment by Mohamad Tahir, Hatim, Madi, Tamer N. N., Husin, Mohd Zabidin, Puteh, Nurnasran

    Published 2011
    “…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…From the analysis, both Self-Shrinking and W7 generator succeeded all tests but, only W7 generator is adopted into the software application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…In this work, the recovery elements of the modified LSB and AES algorithms were examined to conduct testing.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…In addition to theoretical (mathematical) proof and to provide laboratory confirmation,this research has also used NCTUns to conduct tests and experiments to measure different performance metrics of the new algorithm such as end-to-end delay, link utilization, efficiency and fairness, and compared the results with the results of the same tests on older versions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Finally, the model was pickled and loaded into the web application. The web application was created to test the effectiveness of the model, it would simulate the process of cyberbullying that will occur in a social media site.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…It is proven in this thesis that the new approach has by far achieved the best performance among all the algorithms being tested in this research …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project