Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede Oct 2013

Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede

The African Journal of Information Systems

Steganography is an ancient art. It is used for security in open systems. It focuses on hiding secret messages inside a cover medium. The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. We worked with text as the cover medium with the aim of increasing robustness and capacity of hidden data. Elitism is used …


Shadows In Time: A Study Of Temporal Metaphysics Through Hard Science Fiction And Its Restrictions On The Past And Future, Lindsey E. Mitchell Aug 2013

Shadows In Time: A Study Of Temporal Metaphysics Through Hard Science Fiction And Its Restrictions On The Past And Future, Lindsey E. Mitchell

Oglethorpe Journal of Undergraduate Research

Through a series of essays, this body of work explores the varying theories concerning the nature of time and how each theory affects the possibility and outcome of time travel. Following these essays, a collection of short stories focuses on what the author considers the most probable theories concerning time and expands on how they might affect a time traveler's decisions and fate.


Why I Am Not A Materialist, John Cramer Dr. May 2013

Why I Am Not A Materialist, John Cramer Dr.

Oglethorpe Journal of Undergraduate Research

Materialism is a world view that insists the world is nothing but matter. My purpose here is to show it is not a viable world view. Its monism creates severe difficulties for it, centered on the nature of the human mind and the truth of beliefs. Nor is it fit for human consumption because it denies human uniqueness and denigrates human needs.


Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe Apr 2013

Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe

The African Journal of Information Systems

The inefficiencies of current intrusion detection system against fraudulent cyber activities attracts the attention of computer gurus, also known as “hackers” to exploit known weakness on a particular host or network. These hackers are expert programmers who mainly focus on how the Internet works, and they interact with each other to know its strengths and weaknesses. Then they develop advanced tools which an average attacker with little background can use to know the liveness, reachability and running service on the network. Once an attacker identifies these details, he can accurately launch an effective attack and get maximum benefit out of …