Search Results - (( evolution optimization encryption algorithm ) OR ( java applications force algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  3. 3

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis