Search Results - (( basic _ compression algorithm ) OR ( java implementation bat algorithm ))
Search alternatives:
- java implementation »
- implementation bat »
- bat algorithm »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Speech Compression Using Discrete Wavelet Transform
Published 2003“…Software simulating the lossy compression scheme is developed using Matlab 6. This software provides the basic speech analysis as well as the compression and decompression operations. …”
Get full text
Get full text
Thesis -
3
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
4
TEMPERATURE CONTROLLER FOR AUTOMOTIVE ENGINE RESEARCH
Published 2009“…This report basically discusses the preliminary research done and basic understanding of the chosen topic, which is Temperature Controller for Automotive engine Research. …”
Get full text
Get full text
Final Year Project -
5
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Basically, the proposed of FUHS16, UHDS16 and UHDS8 algorithm produces the best motion vector estimation finding based on the block-based matching criteria. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Performance Analysis of Motion Estimation Algorithms on Digital Video Images
Published 2011“…In the BMME, search patterns with different shapes or sizes and the center-biased characteristics of motion vector (MV) have large impact on the search speed (search points) and peak signal-to-noise ratio (PSNR) as the quality of video images. These basic algorithms are Full Search and other two fast search methods. …”
Get full text
Get full text
Article -
7
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…The compression algorithm must also preserve original information in the original image. …”
Get full text
Get full text
Thesis -
8
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…In this study, after planning and conducting a series of laboratory works, some basic properties of marine clay treated with recycled tiles together with their unconfined compressive strength (UCS) values were obtained. …”
Get full text
Get full text
Article -
9
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…In this study, after planning and conducting a series of laboratory works, some basic properties of marine clay treated with recycled tiles together with their unconfined compressive strength (UCS) values were obtained. …”
Get full text
Get full text
Article -
10
Algorithm development for optimization of a refrigeration system
Published 2010“…This thesis deals with algorithm development for optimization of a refrigeration system. …”
Get full text
Get full text
Undergraduates Project Papers -
11
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With the same compression properties, this encryption algorithm was shown to be able to produce average file size smaller than baseline JPEG and other encryption. …”
Get full text
Get full text
Thesis -
12
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
13
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…Embedding a secret image in steganography without causing distortion or detection is challenging due to image size constraints, which require compression. This compression can lead to content loss and makes the hidden data vulnerable to steganalysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
SOLID-STATE MP3 PLAYER
Published 2005“… • A decoder to run a decompression algorithm that undoes the compression of the MP3 file and then a digital-to-analog converter turns the bytes back into waves…”
Get full text
Get full text
Final Year Project -
15
-
16
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
Published 2021“…In light of its beneficial qualities, such as quick decomposition, high compression ratio, and the independence of resolution at any size make these applications conceivable. …”
Get full text
Get full text
Article -
17
Concealment of files blocked by Gmail with EOF-based image steganography
Published 2018“…The proposed algorithm is implemented on Visual Basic.Net software. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
One-dimension high-order compact method for solving euler's equation
Published 2010“…In the field of computational fluid dynamics, many numerical algorithms have been developed to simulate inviscid, compressible flows problems. …”
Get full text
Get full text
Thesis -
19
One-dimensional high-order compact method for solving Euler's equations
Published 2011“…In the field of computational fluid dynamics, many numerical algorithms have been developed to simulate inviscid, compressible flows problems. …”
Get full text
Get full text
Conference or Workshop Item -
20
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis
