Search Results - (( based transformation issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- transformation issues »
- based transformation »
- implication based »
- issues algorithm »
- java implication »
-
1
-
2
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
3
Improved stereo matching algorithm based on census transform and dynamic histogram cost computation
Published 2021“…This new taxonomy improves the local method of stereo matching algorithm based on the dynamic cost computation for disparity map measurement. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation
Published 2014“…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
Get full text
Get full text
Article -
6
Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM
Published 2011“…The wavelet transform is referred as Discrete Wavelet Transform OFDM (DWT-OFDM). …”
Get full text
Get full text
Get full text
Book Chapter -
7
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
Get full text
Get full text
Thesis -
8
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
9
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…The complete and consistent data are put into clusters, and the designed algorithm predicts the position of any incomplete and inconsistent data, based on its value to be added to the specific cluster. …”
Get full text
Get full text
Get full text
Thesis -
10
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
Get full text
Get full text
Thesis -
12
Image encryption algorithm based on chaotic mapping
Published 2003“…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
14
-
15
FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation
Published 2022“…Security has grown in importance as a study issue in recent years. Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
An Adaptive Overcurrent Protection Scheme of Distribution Networks With DG Penetration
Published 2023“…Thus, adaptive overcurrent protection is necessary to counter the issue and can be implemented by using a microprocessor-based overcurrent relay. …”
-
18
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…It is non-trivial to note that EEG-based signals for instance, winking could mitigate the aforesaid issue. …”
Get full text
Get full text
Thesis -
19
A new descriptor for smile classification based on cascade classifier in unconstrained scenarios
Published 2021“…In this paper, an adaptive model for smile classification is suggested that integrates a row-transform-based feature extraction algorithm and a cascade classifier to increase the precision of facial recognition. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis
