Search Results - (messages OR message) - methods
Search alternatives:
- methods »
-
1
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…At present, there are no mobile applications that have an encryption and decryption text method before sending and receiving the messages. …”
Get full text
Get full text
Student Project -
2
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
Get full text
Get full text
Get full text
Thesis -
3
Method and system for steganography within handwritten signature images
Published 2013“…A method for encoding a text message within a handwritten signature includes the steps of pre-processing the handwritten signature for preparing the signature into a suitable format for extracting at least one attribute of the handwritten signature, extracting the at least one attribute of the handwritten signature from the suitable format, coding the text message into a pre-defined coding format and encrypting the text message into an encrypted code and embedding the encrypted code of the text message within the at least one attribute extracted from the handwritten signature. …”
Get full text
Patent -
4
Analisis mesej dakwah Islamiah dalam halaman Facebook
Published 2017“…However, the focus on Islamic messages using the medium is limited and requires a deeper understanding especially in terms of its form, purpose and method. …”
Get full text
Get full text
Get full text
Thesis -
5
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
Get full text
Get full text
Get full text
Thesis -
6
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Mobile Instant Messaging as Collaborative Tool for Language Learning
Published 2019“…Numerous issues, such as exploration of the application, the research methods, participants, intervention duration, teaching method, collaborative learning strategies, impacts, and challenges were addressed. …”
Get full text
Get full text
Get full text
Article -
8
A framework for sms spam filtering
Published 2014“…This paper proposed methods on how to filter the spam messages. In the content of this paper, the discussions are mainly how to use the functionality of bag-of-words, importance of feature extraction and classification for the incoming unknown messages. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Design of moving message LCD display system (MMDS) via short message service (SMS) entry using rabbit 2000 microcontroller
Published 2006“…This thesis presents an application of an LCD Display module that can display the message display when the message is sent via mobile phone. …”
Get full text
Get full text
Student Project -
10
Implementing multi prime RSA digital signature in Shamir’s three pass protocol / Muhammad Arif Musa Abdullah, Muhammad Alif Haidhar Halim and Nur Muhammad Danish Raisham
Published 2023“…The methodology is sending the messages using Shamir’s Three Pass Protocol but the encrypted message will be signed using RSA digital signature method to be able to verify the sender and receiver. …”
Get full text
Get full text
Student Project -
11
Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak
Published 2020“…Beside, this method also capable of producing dynamic secret messages using a single cover text.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
Published 2015“…Therefore, if there is a secret message, then it can be easily seen. One method for sending data without making curiosity is using the steganography where a secret message can be transmitted in such a way so that attackers are not aware of the existence of something in the message. …”
Get full text
Get full text
Get full text
Article -
13
A study on comparison between common object request broker arcmtecture (CORBA) and XYBASE message broker (XMB) / Inna Mohd Izman
Published 2003“…In the fourth chapters, it provides information on research methodology, whereby it will describe on the data collection method. The method is used to gather all the related information about the research. …”
Get full text
Thesis -
14
SMSAD: a framework for spam message and spam account detection
Published 2019“…In addition, microblogging messages are very unstructured and noisy. These distinguished characteristics posed challenges to existing email spam detection models for effective spam identification in short message communication media. …”
Get full text
Get full text
Article -
15
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…An LSB method is presented in this paper to hide the message clearly within the secure transfer.…”
Get full text
Get full text
Student Project -
16
Viewers' perception towards message advertisement that provided by TV3 / Nur Shazwani Abd Rahman
Published 2007“…Beside that, the purpose of this research is to examine viewers' response from the message advertisement that provided by TV3. This will provide information about persuasion message can influence viewers' response. …”
Get full text
Get full text
Student Project -
17
Gender messages in contemporary Malay songs
Published 2013“…A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992) method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. …”
Get full text
Get full text
Get full text
Article -
18
Congratulatory Messages Strategy in Facebook and Twitter
Published 2019“…The content analysis method is used to analyse the congratulating strategy used by the Malay speakers. …”
Get full text
Get full text
Get full text
Article -
19
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. …”
Get full text
Get full text
Thesis -
20
Loss versus gain: integrating technology and message framing in promoting proper hand washing among grade 1 pupils
Published 2011“…The data was gathered through a pre-test and post-test method. In the analysis, the total average scores of the posttest of each group, positive message framing and negative message framing, was used to determine which type of message framing through an AVP is more effective in teaching and promoting proper hand washing. …”
Get full text
Get full text
Get full text
Article
