Search Results - (( data solution using algorithm ) OR ( java application new algorithm ))
Search alternatives:
- java application »
- using algorithm »
- application new »
- solution using »
- data solution »
- new algorithm »
-
1
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
3
Network monopoly / Tan Kean Yeap
Published 2002“…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. …”
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
-
8
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Two datasets have been used in the experiment, generated data set and Harvard Sensor Lab data set, in order to validate the performance of the proposed solution. …”
Get full text
Get full text
Get full text
Thesis -
10
Improvement DACS3 Searching Performance using Local Search
Published 2009“…Embedding such behavior has improved quality of solution and time taken to reach the solution. However, the algorithm performance is reduced for large data set. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…Results of the experiments that were conducted using various data sets showed that the proposed algorithm produced better course schedule solution than the Greedy Algorithm, Genetic Algorithm, and other variants of Ant System Algorithm.…”
Get full text
Get full text
Get full text
Thesis -
12
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…The AES algorithm is the cryptographic technique used to lock or encrypt data. …”
Get full text
Get full text
Get full text
Article -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
14
-
15
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…The excellent proficiency of the developed intelligence expert system is the result of the hybrid structure of the BA and PSO algorithm and the substitution of weaker solutions in each algorithm with better solutions from other algorithms. …”
Get full text
Get full text
Article -
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
18
Data Analysis using Particle Swarm Optimization Algorithm
Published 2015Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems
Published 2019“…The processes of retrieving useful information from a dataset are an important data mining technique that is commonly applied, known as Data Clustering. …”
Get full text
Get full text
Get full text
Article -
20
Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD)
Published 2020“…Clustering, an unsupervised method of grouping sets of data, is used as a solution technique in various fields to divide and restructure data to become more significant and transform them into more useful information. …”
Get full text
Get full text
Get full text
Article
