Search Results - messages - methods
Search alternatives:
- messages »
- methods »
-
1
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
Get full text
Get full text
Get full text
Thesis -
2
Method and system for steganography within handwritten signature images
Published 2013“…A method for encoding a text message within a handwritten signature includes the steps of pre-processing the handwritten signature for preparing the signature into a suitable format for extracting at least one attribute of the handwritten signature, extracting the at least one attribute of the handwritten signature from the suitable format, coding the text message into a pre-defined coding format and encrypting the text message into an encrypted code and embedding the encrypted code of the text message within the at least one attribute extracted from the handwritten signature. …”
Get full text
Patent -
3
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…At present, there are no mobile applications that have an encryption and decryption text method before sending and receiving the messages. …”
Get full text
Get full text
Student Project -
4
Analisis mesej dakwah Islamiah dalam halaman Facebook
Published 2017“…However, the focus on Islamic messages using the medium is limited and requires a deeper understanding especially in terms of its form, purpose and method. …”
Get full text
Get full text
Get full text
Thesis -
5
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
Get full text
Get full text
Get full text
Thesis -
6
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
Published 2015“…Therefore, if there is a secret message, then it can be easily seen. One method for sending data without making curiosity is using the steganography where a secret message can be transmitted in such a way so that attackers are not aware of the existence of something in the message. …”
Get full text
Get full text
Get full text
Article -
7
Experimenting text input methods in mobile application / Anuar Mohd Yusof
Published 2005“…There are numerous errors when typing messages using text input methods. Moreover, some text input methods are just too expensive and these methods take so much space in mobile phones' memory. …”
Get full text
Get full text
Thesis -
8
Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak
Published 2020“…Beside, this method also capable of producing dynamic secret messages using a single cover text.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A framework for sms spam filtering
Published 2014“…This paper proposed methods on how to filter the spam messages. In the content of this paper, the discussions are mainly how to use the functionality of bag-of-words, importance of feature extraction and classification for the incoming unknown messages. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Mobile Instant Messaging as Collaborative Tool for Language Learning
Published 2019“…Numerous issues, such as exploration of the application, the research methods, participants, intervention duration, teaching method, collaborative learning strategies, impacts, and challenges were addressed. …”
Get full text
Get full text
Get full text
Article -
11
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…An LSB method is presented in this paper to hide the message clearly within the secure transfer.…”
Get full text
Get full text
Student Project -
12
Implementing multi prime RSA digital signature in Shamir’s three pass protocol / Muhammad Arif Musa Abdullah, Muhammad Alif Haidhar Halim and Nur Muhammad Danish Raisham
Published 2023“…The methodology is sending the messages using Shamir’s Three Pass Protocol but the encrypted message will be signed using RSA digital signature method to be able to verify the sender and receiver. …”
Get full text
Get full text
Student Project -
13
A study on comparison between common object request broker arcmtecture (CORBA) and XYBASE message broker (XMB) / Inna Mohd Izman
Published 2003“…In the fourth chapters, it provides information on research methodology, whereby it will describe on the data collection method. The method is used to gather all the related information about the research. …”
Get full text
Thesis -
14
Detection of presence marks in stegocontent
Published 2013“…LSB is the method that most commonly used in steganography to hide message.…”
Get full text
Get full text
Undergraduates Project Papers -
15
The Progressive Multilevel Embedding Method for Audio Steganography
Published 2024journal::journal article -
16
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
17
SMSAD: a framework for spam message and spam account detection
Published 2019“…In addition, microblogging messages are very unstructured and noisy. These distinguished characteristics posed challenges to existing email spam detection models for effective spam identification in short message communication media. …”
Get full text
Get full text
Article -
18
THE IMPACT OF ALTRUISM MESSAGES IN GREEN PRODUCT ADVERTISING ON CONSUMER ATTITUDE: A SURVEY TO GEN Z
Published 2023“…The method used is the descriptive-associative method. …”
Get full text
Get full text
Get full text
Article -
19
Loss versus gain: integrating technology and message framing in promoting proper hand washing among grade 1 pupils
Published 2011“…The data was gathered through a pre-test and post-test method. In the analysis, the total average scores of the posttest of each group, positive message framing and negative message framing, was used to determine which type of message framing through an AVP is more effective in teaching and promoting proper hand washing. …”
Get full text
Get full text
Get full text
Article -
20
Opinion mining of movie review using hybrid method of support vector machine and particle swarm optimization
Published 2012“…The positive class shows good message opinion; otherwise the negative class shows the bad message opinion of certain movies. …”
Get full text
Get full text
Conference or Workshop Item
