Search Results - (( java using text algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- text algorithm »
- java using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. …”
Get full text
Get full text
Final Year Project -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Café Web Based System Using Priority Scheduling Approach
Published 2017Get full text
Get full text
Conference or Workshop Item -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Input is given as text files. Particular input is read by the relevant Java program and the encryption time and secrecy are calculated and output on the screen. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
16
-
17
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…In order to address these shortcomings, seven text-based conversational chatbots for the students to learn Java in an interactive and engaging manners had been built. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project
