Search Results - (( _ transformational issues algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Improved stereo matching algorithm based on census transform and dynamic histogram cost computation by Kadmin, Ahmad Fauzan, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Hamid, Mohd Saad, Abd Gani, Shamsul Fakhar

    Published 2021
    “…Stereo matching is a significant subject in the stereo vision algorithm. Traditional taxonomy composition consists of several issues in the stereo correspondences process such as radiometric distortion, discontinuity, and low accuracy at the low texture regions. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A proposed genetic algorithm to optimize service restoration in electrical networks with respect to the probability of transformers failure by Aminian, Masoud, Moazami, Ehsan, Mirzaei, Maryam, Ab Kadir, Mohd Zainal Abidin

    Published 2010
    “…Expected results of this new algorithm should lead to a new plan of restoration in permissible ranges of transformer loading in respect of their age, previous experienced faults and condition monitoring.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…Traditional data transformation methods such as Extract-Transform-Load (ETL) use data sources from a diverse range of devices and locations resulting in incomplete and inconsistent DQ that may lead to wrong insights and decisions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari

    Published 2014
    “…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM by Abdullah, Khaizuran, Hussain, Zahir M.

    Published 2011
    “…The wavelet transform is referred as Discrete Wavelet Transform OFDM (DWT-OFDM). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Voltage Regulation Planning Based on Optimal Grid-Connected Renewable Energy Allocation Using Nature-Inspired Algorithms to Reduce Switching Cycles of On-Load Tap Changing Transfor... by Hamid, K. Ali, Ahmed, M. A. Haidar, Norhuzaimin, Julai, Andreas, Helwig

    Published 2023
    “…Accordingly, the major contribution of this paper is to address the switching cycle issues of the on-load tap changing transformer. Initially, a framework is proposed to optimize the location and size of renewable power generation using a multi-objective cuckoo search optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    An Adaptive Overcurrent Protection Scheme of Distribution Networks With DG Penetration by Muhammad Zul Helfi Azri Bin Abd Hadi

    Published 2023
    “…In this thesis, a fast recursive discrete Fourier transform (FRDFT) algorithm is introduce into the overcurrent relay to ensure the relay detect accurate fault signal and sends a correct signal to circuit breaker. …”
  20. 20

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Thesis