Search Results - (( data solution using algorithm ) OR ( java application new algorithm ))

Refine Results
  1. 1

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Two datasets have been used in the experiment, generated data set and Harvard Sensor Lab data set, in order to validate the performance of the proposed solution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Improvement DACS3 Searching Performance using Local Search by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2009
    “…Embedding such behavior has improved quality of solution and time taken to reach the solution. However, the algorithm performance is reduced for large data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…Results of the experiments that were conducted using various data sets showed that the proposed algorithm produced better course schedule solution than the Greedy Algorithm, Genetic Algorithm, and other variants of Ant System Algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems by Yaseen, Zaher, Ehteram, Mohammad, Hossain, Md., Fai, Chow, Koting, Suhana, Mohd, Nuruol Syuhadaa, Jaafar, Wan Zurina Wan, Afan, Haitham Abdulmohsin, Lai, Sai Hin, Zaini, Nuratiah, Ahmed, Ali, El-Shafie, Ahmed

    Published 2019
    “…The excellent proficiency of the developed intelligence expert system is the result of the hybrid structure of the BA and PSO algorithm and the substitution of weaker solutions in each algorithm with better solutions from other algorithms. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems by Haneen, Abd Wahab, Noraziah, Ahmad, Alsewari, Abdulrahman A., Sinan, Q. Salih

    Published 2019
    “…The processes of retrieving useful information from a dataset are an important data mining technique that is commonly applied, known as Data Clustering. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD) by Rashed, Alwatben Batoul, Hamdan, Hazlina, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Yaakob, Razali, Abubakar, Mansir

    Published 2020
    “…Clustering, an unsupervised method of grouping sets of data, is used as a solution technique in various fields to divide and restructure data to become more significant and transform them into more useful information. …”
    Get full text
    Get full text
    Get full text
    Article