Search Results - (( data solution using algorithm ) OR ( java implementation 5s algorithm ))
Search alternatives:
- java implementation »
- implementation 5s »
- using algorithm »
- solution using »
- data solution »
- 5s algorithm »
-
1
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
-
7
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
8
-
9
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
11
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
13
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
14
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Two datasets have been used in the experiment, generated data set and Harvard Sensor Lab data set, in order to validate the performance of the proposed solution. …”
Get full text
Get full text
Get full text
Thesis -
15
Improvement DACS3 Searching Performance using Local Search
Published 2009“…Embedding such behavior has improved quality of solution and time taken to reach the solution. However, the algorithm performance is reduced for large data set. …”
Get full text
Get full text
Conference or Workshop Item -
16
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…Results of the experiments that were conducted using various data sets showed that the proposed algorithm produced better course schedule solution than the Greedy Algorithm, Genetic Algorithm, and other variants of Ant System Algorithm.…”
Get full text
Get full text
Get full text
Thesis -
17
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…The AES algorithm is the cryptographic technique used to lock or encrypt data. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…The excellent proficiency of the developed intelligence expert system is the result of the hybrid structure of the BA and PSO algorithm and the substitution of weaker solutions in each algorithm with better solutions from other algorithms. …”
Get full text
Get full text
Article
