Search Results - (( based transformation issues algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Improved stereo matching algorithm based on census transform and dynamic histogram cost computation by Kadmin, Ahmad Fauzan, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Hamid, Mohd Saad, Abd Gani, Shamsul Fakhar

    Published 2021
    “…This new taxonomy improves the local method of stereo matching algorithm based on the dynamic cost computation for disparity map measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari

    Published 2014
    “…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
    Get full text
    Get full text
    Article
  6. 6

    Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM by Abdullah, Khaizuran, Hussain, Zahir M.

    Published 2011
    “…The wavelet transform is referred as Discrete Wavelet Transform OFDM (DWT-OFDM). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  9. 9

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…The complete and consistent data are put into clusters, and the designed algorithm predicts the position of any incomplete and inconsistent data, based on its value to be added to the specific cluster. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…Security has grown in importance as a study issue in recent years. Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    An Adaptive Overcurrent Protection Scheme of Distribution Networks With DG Penetration by Muhammad Zul Helfi Azri Bin Abd Hadi

    Published 2023
    “…Thus, adaptive overcurrent protection is necessary to counter the issue and can be implemented by using a microprocessor-based overcurrent relay. …”
  18. 18

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…It is non-trivial to note that EEG-based signals for instance, winking could mitigate the aforesaid issue. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A new descriptor for smile classification based on cascade classifier in unconstrained scenarios by Hassen, Oday Ali, Abu, Nur Azman, Zainal Abidin, Zaheera, Saad, Mohamed Darwish

    Published 2021
    “…In this paper, an adaptive model for smile classification is suggested that integrates a row-transform-based feature extraction algorithm and a cascade classifier to increase the precision of facial recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
    Get full text
    Get full text
    Thesis