Search Results - (( messaging application using algorithm ) OR ( java optimization based algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  4. 4

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite by Suali, Anjila J., Nuraminah Ramli, Rozmie Razif Othman, Hasneeza Liza Zakaria, Iszaidy Ismail, Nor Shahida Mohd Jamail, Rimuljo Hendradi, Nurol Husna Che Rose

    Published 2025
    “…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  8. 8

    A heuristics approach for classroom scheduling using genetic algorithm technique by Ahmad, Izah R., Sufahani, Suliadi, Ali, Maselan, Mohd Razali, Siti Noor Asyikin

    Published 2017
    “…The proposed of heuristics approach will prompt a superior utilization of the accessible classroom space for a given time table of courses at the university. Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
    Get full text
    Get full text
    Article
  9. 9

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  10. 10

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15

    Learning to Filter Text in Forum Malay Message using Naive Bayesian Technique by Ab. Halim, Norhadila

    Published 2006
    “…Applying the basic filtering technique in forum application has been discussed in [I]. The paper explains about me use of the basic naive Bayesian algorithm to classify forum messages whether clean or bad where clean message has no bad words, while bad message contains at least one bad word. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17
  18. 18
  19. 19

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Applying learning to filter text by Sainin, Mohd Shamrie

    Published 2005
    “…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
    Get full text
    Get full text
    Conference or Workshop Item