Search Results - (( messaging application testing algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- messaging application »
- application testing »
- testing algorithm »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
3
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
4
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
5
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article -
6
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008Get full text
Get full text
Final Year Project -
7
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
thesis::doctoral thesis -
8
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
10
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010Get full text
Get full text
Citation Index Journal -
11
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
12
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…From the analysis, both Self-Shrinking and W7 generator succeeded all tests but, only W7 generator is adopted into the software application. …”
Get full text
Get full text
Get full text
Thesis -
13
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…In this work, the recovery elements of the modified LSB and AES algorithms were examined to conduct testing.…”
Get full text
Get full text
Get full text
Article -
14
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…In addition to theoretical (mathematical) proof and to provide laboratory confirmation,this research has also used NCTUns to conduct tests and experiments to measure different performance metrics of the new algorithm such as end-to-end delay, link utilization, efficiency and fairness, and compared the results with the results of the same tests on older versions. …”
Get full text
Get full text
Thesis -
15
Cyberbullying detection: a machine learning approach
Published 2022“…Finally, the model was pickled and loaded into the web application. The web application was created to test the effectiveness of the model, it would simulate the process of cyberbullying that will occur in a social media site.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…It is proven in this thesis that the new approach has by far achieved the best performance among all the algorithms being tested in this research …”
Get full text
Get full text
Thesis -
17
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
18
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis -
19
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007Get full text
Get full text
Research Reports -
20
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project
