About
4
Publications
16,753
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Introduction
Current institution
Additional affiliations
January 2015 - December 2015
Publications
Publications (4)
Data hiding or steganography has been used ever since a secret message was needed to be transferred. Data hiding methods need a medium to be cover for secret message that is to be sent. Different mediums are used such as image, video, audio, and last decade the deoxyribose nucleic acid (DNA). In this paper, a new data hiding approach based on the D...
As the use of technology is increasing rapidly, the
amount of shared, sent, and received information is also increasing
in the same way. As a result, this necessitates the need for
finding techniques that can save and secure the information over
the net. There are many methods that have been used to protect
the information such as hiding information...
XML files are used widely to save the information especially in the field of bioinformatics about the whole genome. There are many programming languages and modules used to parse XML files in different platforms such as Linux, Macintosh and Windows. The aim of this report is to reveal and determine which common programming language to use and on wh...
The process involve in building a successful website goes beyond knowing web developing languages such as HTML and CSS. The success or failure of any website depends heavily on the use of some aspects of Graphical User Interface. These aspects are usually reserved for client’s wishes and desires. The content features of the GUI are used to stay in...