Search Results - (( java application modified algorithm ) OR ( cover selection method algorithm ))
Search alternatives:
- application modified »
- java application »
- selection method »
- method algorithm »
- cover selection »
-
1
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. …”
Get full text
Get full text
Get full text
Article -
2
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…Material and methods: To test the proposed technique, selected approximation algorithms have been developed to small graph instances. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article -
6
-
7
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Get full text
Article -
8
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
9
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
10
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…It was shown that our approach needs 30% of the test cases to cover all the faults, while 80% is needed to cover all the faults using retest-all, which is time consuming and costly.…”
Get full text
Get full text
Article -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
13
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Selection of access network using cost function method in heterogeneous wireless network
Published 2014“…This method covers the weight distribution and cost factor techniques.The weight distribution is used to measure different weights for existing wireless network based on the user's preference and mobile terminal power.The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight.Results obtained showed that the algorithm has the ability to increase user's satisfaction compared to other algorithms, which consistently choose one accessible network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…To address these problems, a novel method combining a covering rough set and a K-Means clustering algorithm (RK-Means) was proposed in this paper. …”
Article -
18
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…This thesis proposes methods that can overcome the problems of good behaviour selection and good behaviour deletion. …”
Get full text
Get full text
Thesis -
19
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…Hand images are gathered from ten (10) selected persons using digital camera (2.0 mega pixels) and for pvirpose of the study frontal view is only hand area covered. …”
Get full text
Thesis -
20
Meta-heuristic structure for multiobjective optimization case study: Green sand mould system
Published 2014“…In this chapter, an approach that merges meta-heuristic algorithms with the weighted sum method is introduced. …”
Get full text
Get full text
Book
