Search Results - (( messaging application testing algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- messaging application »
- application testing »
- application sensor »
- testing algorithm »
- java application »
- sensor algorithm »
-
1
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
2
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
4
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
5
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article -
6
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008Get full text
Get full text
Final Year Project -
7
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
thesis::doctoral thesis -
8
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
10
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
11
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010Get full text
Get full text
Citation Index Journal -
12
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
13
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…From the analysis, both Self-Shrinking and W7 generator succeeded all tests but, only W7 generator is adopted into the software application. …”
Get full text
Get full text
Get full text
Thesis -
14
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…In this work, the recovery elements of the modified LSB and AES algorithms were examined to conduct testing.…”
Get full text
Get full text
Get full text
Article -
16
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…In addition to theoretical (mathematical) proof and to provide laboratory confirmation,this research has also used NCTUns to conduct tests and experiments to measure different performance metrics of the new algorithm such as end-to-end delay, link utilization, efficiency and fairness, and compared the results with the results of the same tests on older versions. …”
Get full text
Get full text
Thesis -
17
Cyberbullying detection: a machine learning approach
Published 2022“…Finally, the model was pickled and loaded into the web application. The web application was created to test the effectiveness of the model, it would simulate the process of cyberbullying that will occur in a social media site.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…It is proven in this thesis that the new approach has by far achieved the best performance among all the algorithms being tested in this research …”
Get full text
Get full text
Thesis -
19
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
20
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis
