Search Results - (( java application based algorithm ) OR ( java information science algorithm ))
Search alternatives:
- application based »
- java application »
- java information »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Studies have shown how user perception can have a strong influence on policies and decision-making processes in a place, society, and nation. This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
4
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
5
-
6
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. …”
Get full text
Get full text
Get full text
Article -
7
-
8
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. …”
Get full text
Get full text
Get full text
Article -
9
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
10
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
Study and Implementation of Data Mining in Urban Gardening
Published 2019Get full text
Get full text
Get full text
Article -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
-
19
-
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008Get full text
Get full text
Conference or Workshop Item
