Search Results - (( basic image compression algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- basic image »
- compression »
-
1
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…The compression algorithm must also preserve original information in the original image. …”
Get full text
Get full text
Thesis -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…This thesis work studied on digital image encryption algorithms performed towards JPEG images. …”
Get full text
Get full text
Thesis -
4
Performance Analysis of Motion Estimation Algorithms on Digital Video Images
Published 2011“…In the BMME, search patterns with different shapes or sizes and the center-biased characteristics of motion vector (MV) have large impact on the search speed (search points) and peak signal-to-noise ratio (PSNR) as the quality of video images. These basic algorithms are Full Search and other two fast search methods. …”
Get full text
Get full text
Article -
5
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…The UHDS8 algorithm also offers improvement in terms of image quality performance, computational complexity and elapsed processing time. …”
Get full text
Get full text
Get full text
Book Chapter -
6
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…Embedding a secret image in steganography without causing distortion or detection is challenging due to image size constraints, which require compression. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
Published 2021“…As a result of these principles, fractal image codings are being used in many substantial applications already, such as image compression, image signature, image watermarking, image attribute extraction, and even image texture segmentation. …”
Get full text
Get full text
Article -
8
Concealment of files blocked by Gmail with EOF-based image steganography
Published 2018“…The proposed algorithm is implemented on Visual Basic.Net software. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
10
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…The final results have proved that HPSO algorithm could achieve 5% - 34% of computation cost reduction with satisfying degradation value of image quality. …”
Get full text
Get full text
Thesis -
11
Fractal coding of bio-metric image for face authentication
Published 2021“…Due to this adoption, fractal image coding has already established numerous significant applications in image biometrics, picture compression, image signature, image watermarking, image extraction, and even image texture segmentation. …”
Get full text
Get full text
Thesis -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
16
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
