Search Results - (( _ compression process algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Thresholding and quantization algorithms for image compression techniques : a review by Lashari, Saima Anwar, Rosziati Ibrahim, Nik Shahidah Afifi Md Taujuddin, Norhalina Senan, Suhaila Sari

    Published 2018
    “…This paper presents a review of image compression principle, compression techniques and various thresholding algorithms (pre-processing algorithms) and quantization algorithm (post-processing algorithms). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Thresholding and quantization algorithms for image compression techniques: a review by Lashari, Saima Anwar, Ibrahim, Rosziati, Md Taujuddin, Nik Shahidah Afifi, Senan, Norhalina, Sari, Suhaila

    Published 2018
    “…This paper presents a review of image compression principle, compression techniques and various thresholding algorithms (pre-processing algorithms) and quantization algorithm (post-processing algorithms). …”
    Get full text
    Get full text
    Article
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Parallelization Of CCSDS Hyperspectral Image Compression Using C++ by Tan, Lit Chez

    Published 2018
    “…Currently, most implementation of the CCSDS-MHC algorithm utilizessingle processor core for the compression process. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Improved thresholding and quantization techniques for image compression by Md Taujuddin, Nik Shahidah Afifi

    Published 2017
    “…Moreover, the compression process involves eliminating some data that degrades the image quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Second compression for pixelated images under edge-based compression algorithms: JPEG-LS as an example by Al-Khayyat, Kamal, Alshaikhli, Imad Fakhri Taha, Al-Hagery, Mohammed

    Published 2021
    “…This paper details the examination of a particular case of data compression, where the compression algorithm removes the redundancy from data, which occurs when edge-based compression algorithms compress (previously com- pressed) pixelated images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Speech compression using compressive sensing on a multicore system by Gunawan, Teddy Surya, Khalifa, Othman Omran, Shafie, Amir Akramin, Ambikairajah, Eliathamby

    Published 2011
    “…The performance of overall algorithms will be evaluated based on the processing time and speech quality. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Evaluation of sparsifying algorithms for speech signals by Kassim, Liban A., Khalifa, Othman Omran, Gunawan, Teddy Surya

    Published 2012
    “…Sparsity is important also in speech compression and coding, where the signal can be compressed in pre-processing stages. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    CUDA implementation of fractal image compression by Al Sideiri A., Alzeidi N., Al Hammoshi M., Chauhan M.S., AlFarsi G.

    Published 2023
    “…Encoding (symbols); Fractals; Graphics processing unit; Image coding; Program processors; Signal encoding; Signal to noise ratio; CUDA; Fractal image compression; Fractal image compression algorithm; Graphical processing unit (GPUs); Lossy image compression; Parallel processing; Peak signal to noise ratio; Quad-tree partitioning; Image compression…”
    Article
  14. 14

    Measuring the performance of image data by using RLE algorithm in lossless compression technique by Nurmarsyita, Mohd Shah

    Published 2015
    “…This result will produce by using lossless compression technique which is consist of four stage such as analysis, pre-processing, design, probability algorithm and testing.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…First, the new data compression algorithm is proposed for compressing sensed data before it gets transmitted to the sink. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…Therefore, reducing the response time and overhead will enhance the communication process. To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Design issues and challenges of an FPGA-based orthogonal matching pursuit implementation for compressive sensing reconstruction by Mohd Nadzri,, Muhammad Muzakkir, Ahmad, Afandi, Tukiran, Zarina

    Published 2020
    “…Compressive sensing (CS) is as an evolving research area in signal processing due to the advantages offered for signal compression. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Results showed that our proposed algorithm performs better than the traditional CELP algorithm, in terms of PESQ score and processing time.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm by Jati, Grafika, Rachmasari, Ardina Rizqy, Jatmiko, Wisnu, Mursanto, Petrus, Sediono, Wahju

    Published 2017
    “…This research proposes an efficient combination of a compression and an encryption algorithms. Two-Dimension Set Partitioning in Hierarchical Tree (2D-SPIHT) used to optimally compress signals then combined with recently lightweight encryption algorithm, namely Secure IoT (SIT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper