Search Results - (( between transformational issues algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. …”
    Get full text
    Get full text
    Article
  6. 6

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV) by MOHD SHARFRI, RAIHAN AMALINA

    Published 2017
    “…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Waste management using machine learning and deep learning algorithms by Sami, Khan Nasik, Amin, Zian Md Afique, Hassan, Raini

    Published 2020
    “…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli by Zulkipeli, Alis Farhana

    Published 2025
    “…This study applies the Naive Bayes algorithm for sentiment analysis to assess public perceptions of childcare issues, particularly child abandonment and accidents. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…The hybrid method, IDBA-AFW, aims to enhance the original IDBA by incorporating the Adaptive Floyd-Warshall algorithm for graph transformation and optimization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A new descriptor for smile classification based on cascade classifier in unconstrained scenarios by Hassen, Oday Ali, Abu, Nur Azman, Zainal Abidin, Zaheera, Saad, Mohamed Darwish

    Published 2021
    “…In this paper, an adaptive model for smile classification is suggested that integrates a row-transform-based feature extraction algorithm and a cascade classifier to increase the precision of facial recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems by Zulkifli, Musa, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2024
    “…The nature of the Cubature Kalman filter (CKF) allows the use of small values for parameters P(0), Q, and R. In the MACKO algorithm, Cubature Transformation Techniques (CTT) are employed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…Data gathering is among the issues constantly acquiring attention in the area of Wireless Sensor Networks (WSNs) due to its impact and ability to transform many areas associated with the human life. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…This study aimed to explore the performance of different pre-processing methods, namely Fast Fourier Transform, Short-Time Fourier Transform, Discrete Wavelet Transform, and Continuous Wavelet Transform (CWT) that could allow TL models to extract features from the images generated and classify through selected classical ML algorithms . …”
    Get full text
    Get full text
    Thesis