Search Results - (messages OR message) - methods

Search alternatives:

Refine Results
  1. 1

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…At present, there are no mobile applications that have an encryption and decryption text method before sending and receiving the messages. …”
    Get full text
    Get full text
    Student Project
  2. 2

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Method and system for steganography within handwritten signature images by Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Wan Adnan, Wan Azizun

    Published 2013
    “…A method for encoding a text message within a handwritten signature includes the steps of pre-processing the handwritten signature for preparing the signature into a suitable format for extracting at least one attribute of the handwritten signature, extracting the at least one attribute of the handwritten signature from the suitable format, coding the text message into a pre-defined coding format and encrypting the text message into an encrypted code and embedding the encrypted code of the text message within the at least one attribute extracted from the handwritten signature. …”
    Get full text
    Patent
  4. 4

    Analisis mesej dakwah Islamiah dalam halaman Facebook by Mohd Nazif, Badruddin

    Published 2017
    “…However, the focus on Islamic messages using the medium is limited and requires a deeper understanding especially in terms of its form, purpose and method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Mobile Instant Messaging as Collaborative Tool for Language Learning by Kasturi, Sivabalan, Zuraina, Ali

    Published 2019
    “…Numerous issues, such as exploration of the application, the research methods, participants, intervention duration, teaching method, collaborative learning strategies, impacts, and challenges were addressed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A framework for sms spam filtering by Loke, Chi Kuan

    Published 2014
    “…This paper proposed methods on how to filter the spam messages. In the content of this paper, the discussions are mainly how to use the functionality of bag-of-words, importance of feature extraction and classification for the incoming unknown messages. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Design of moving message LCD display system (MMDS) via short message service (SMS) entry using rabbit 2000 microcontroller by Badri, Muhamad Atfan

    Published 2006
    “…This thesis presents an application of an LCD Display module that can display the message display when the message is sent via mobile phone. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Implementing multi prime RSA digital signature in Shamir’s three pass protocol / Muhammad Arif Musa Abdullah, Muhammad Alif Haidhar Halim and Nur Muhammad Danish Raisham by Abdullah, Muhammad Arif Musa, Halim, Muhammad Alif Haidhar, Raisham, Nur Muhammad Danish

    Published 2023
    “…The methodology is sending the messages using Shamir’s Three Pass Protocol but the encrypted message will be signed using RSA digital signature method to be able to verify the sender and receiver. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak by Baharudin, Osman

    Published 2020
    “…Beside, this method also capable of producing dynamic secret messages using a single cover text.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files by Wamiliana, Wamiliana, Usman, Mustofa, Azram, Mohammad, Elfaki, Faiz Ahmed Mohamed, Hijriani, Astria, Panditatwa, Pandya

    Published 2015
    “…Therefore, if there is a secret message, then it can be easily seen. One method for sending data without making curiosity is using the steganography where a secret message can be transmitted in such a way so that attackers are not aware of the existence of something in the message. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study on comparison between common object request broker arcmtecture (CORBA) and XYBASE message broker (XMB) / Inna Mohd Izman by Mohd Izman, Inna

    Published 2003
    “…In the fourth chapters, it provides information on research methodology, whereby it will describe on the data collection method. The method is used to gather all the related information about the research. …”
    Get full text
    Thesis
  14. 14

    SMSAD: a framework for spam message and spam account detection by Adewole, Kayode Sakariyah, Anuar, Nor Badrul, Kamsin, Amirrudin, Sangaiah, Arun Kumar

    Published 2019
    “…In addition, microblogging messages are very unstructured and noisy. These distinguished characteristics posed challenges to existing email spam detection models for effective spam identification in short message communication media. …”
    Get full text
    Get full text
    Article
  15. 15

    Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi by Mohd Alwi, Muhammad Danial

    Published 2021
    “…An LSB method is presented in this paper to hide the message clearly within the secure transfer.…”
    Get full text
    Get full text
    Student Project
  16. 16

    Viewers' perception towards message advertisement that provided by TV3 / Nur Shazwani Abd Rahman

    Published 2007
    “…Beside that, the purpose of this research is to examine viewers' response from the message advertisement that provided by TV3. This will provide information about persuasion message can influence viewers' response. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Gender messages in contemporary Malay songs by Collin, Jerome

    Published 2013
    “…A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992) method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Congratulatory Messages Strategy in Facebook and Twitter by Irahim, Nur Hamimah Muhammad, Bakar, Norsofiah Abu

    Published 2019
    “…The content analysis method is used to analyse the congratulating strategy used by the Malay speakers. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Loss versus gain: integrating technology and message framing in promoting proper hand washing among grade 1 pupils by Analin B

    Published 2011
    “…The data was gathered through a pre-test and post-test method. In the analysis, the total average scores of the posttest of each group, positive message framing and negative message framing, was used to determine which type of message framing through an AVP is more effective in teaching and promoting proper hand washing. …”
    Get full text
    Get full text
    Get full text
    Article