Search Results - (( code data visualization algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- data visualization »
- stemming algorithm »
- java application »
- code data »
-
1
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
2
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
Get full text
Get full text
Get full text
Article -
3
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…This contributes to the creation large amount of data or information such as big data. Big data is a phrase for huge data sets having large, more variety and complicated element with the challenges of storing, analyzing and visualizing for further actions and obtaining the results. …”
Get full text
Get full text
Thesis -
4
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
5
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…In three dimensional simulations, post-processing poses considerable challenge since available data visualization software programs do not accommodate such a high order visualization—common data visualizers can only visualize for up to ten-node tetrahedron elements. …”
Get full text
Get full text
Thesis -
6
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
7
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
8
Challenges in multi-layer data security for video steganography
Published 2018“…The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms. …”
Get full text
Get full text
Get full text
Article -
9
The evolution and trend of chain code scheme
Published 2008“…This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
Get full text
Get full text
Get full text
Article -
10
Algorithm visualization design guidelines for mobile leaning
Published 2018“…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced Flipping Technique to Reduce Variability in Image Steganography
Published 2023“…Benchmarking; Discrete cosine transforms; Genetic algorithms; Image coding; Image enhancement; Mean square error; Signal to noise ratio; Bayes method; Cover-image; Data hidden; Embedding capacity; Flipping methods; Least significant bits; Medium; Optimisations; Variability; Visual qualities; Steganography…”
Article -
12
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
Published 2025“…It is imperative to employ resilient QR code algorithms to guarantee the security of QR code applications in response to this challenge. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…GNU OCTAVE is used for coding and visualization. GNU is a recursive acronym for "GNU's Not Unix!"…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
Get full text
Get full text
Book Section -
16
Efficient mobile video transmission based on a joint coding scheme
Published 2017“…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
Get full text
Get full text
Get full text
Article -
17
Extract Motion from Picture Sequence
Published 2008“…The algorithm is used as reference to create a coding input for the MATLAB, which is the software used in this project. …”
Get full text
Get full text
Final Year Project -
18
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
19
Implementing data hiding in still images / lman Hazwam Abd. Halim and Roshidi Din
Published 2004“…It is a highly multidisciplinary field that combines image and signal processing with cryptography, communication theory, coding theory, signal compression, and the theory of visual perception. …”
Get full text
Get full text
Conference or Workshop Item -
20
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
Get full text
Get full text
Student Project
