Search Results - (( messaging application testing algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
    thesis::doctoral thesis
  13. 13

    RSA algorithm performance in short messaging system exchange environment by Mohamad Tahir, Hatim, Madi, Tamer N. N., Husin, Mohd Zabidin, Puteh, Nurnasran

    Published 2011
    “…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…From the analysis, both Self-Shrinking and W7 generator succeeded all tests but, only W7 generator is adopted into the software application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…In this work, the recovery elements of the modified LSB and AES algorithms were examined to conduct testing.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…In addition to theoretical (mathematical) proof and to provide laboratory confirmation,this research has also used NCTUns to conduct tests and experiments to measure different performance metrics of the new algorithm such as end-to-end delay, link utilization, efficiency and fairness, and compared the results with the results of the same tests on older versions. …”
    Get full text
    Get full text
    Thesis