Search Results - (( _ transformational issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- transformational issues »
- implication based »
- issues algorithm »
- java implication »
-
1
-
2
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
3
-
4
Improved stereo matching algorithm based on census transform and dynamic histogram cost computation
Published 2021“…Stereo matching is a significant subject in the stereo vision algorithm. Traditional taxonomy composition consists of several issues in the stereo correspondences process such as radiometric distortion, discontinuity, and low accuracy at the low texture regions. …”
Get full text
Get full text
Get full text
Article -
5
A proposed genetic algorithm to optimize service restoration in electrical networks with respect to the probability of transformers failure
Published 2010“…Expected results of this new algorithm should lead to a new plan of restoration in permissible ranges of transformer loading in respect of their age, previous experienced faults and condition monitoring.…”
Get full text
Get full text
Conference or Workshop Item -
6
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…Traditional data transformation methods such as Extract-Transform-Load (ETL) use data sources from a diverse range of devices and locations resulting in incomplete and inconsistent DQ that may lead to wrong insights and decisions. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation
Published 2014“…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
Get full text
Get full text
Article -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM
Published 2011“…The wavelet transform is referred as Discrete Wavelet Transform OFDM (DWT-OFDM). …”
Get full text
Get full text
Get full text
Book Chapter -
11
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
12
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
13
-
14
Voltage Regulation Planning Based on Optimal Grid-Connected Renewable Energy Allocation Using Nature-Inspired Algorithms to Reduce Switching Cycles of On-Load Tap Changing Transfor...
Published 2023“…Accordingly, the major contribution of this paper is to address the switching cycle issues of the on-load tap changing transformer. Initially, a framework is proposed to optimize the location and size of renewable power generation using a multi-objective cuckoo search optimization algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The proposed algorithm is evaluated on the IEEE 30-bus test system. …”
Get full text
Get full text
Thesis -
16
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
17
-
18
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
An Adaptive Overcurrent Protection Scheme of Distribution Networks With DG Penetration
Published 2023“…In this thesis, a fast recursive discrete Fourier transform (FRDFT) algorithm is introduce into the overcurrent relay to ensure the relay detect accurate fault signal and sends a correct signal to circuit breaker. …”
-
20
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis
