Search Results - (( code data visualization algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…This contributes to the creation large amount of data or information such as big data. Big data is a phrase for huge data sets having large, more variety and complicated element with the challenges of storing, analyzing and visualizing for further actions and obtaining the results. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…In three dimensional simulations, post-processing poses considerable challenge since available data visualization software programs do not accommodate such a high order visualization—common data visualizers can only visualize for up to ten-node tetrahedron elements. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Challenges in multi-layer data security for video steganography by Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

    Published 2018
    “…The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The evolution and trend of chain code scheme by Wulandhari, Lily Ayu, Haron, Habibollah

    Published 2008
    “…This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Algorithm visualization design guidelines for mobile leaning by Supli, Ahmad Affandi, Shiratuddin, Norshuhada

    Published 2018
    “…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13

    Enhanced Flipping Technique to Reduce Variability in Image Steganography by Kamil S., Abdullah S.N.H.S., Hasan M.K., Bohani F.A.

    Published 2023
    “…Benchmarking; Discrete cosine transforms; Genetic algorithms; Image coding; Image enhancement; Mean square error; Signal to noise ratio; Bayes method; Cover-image; Data hidden; Embedding capacity; Flipping methods; Least significant bits; Medium; Optimisations; Variability; Visual qualities; Steganography…”
    Article
  14. 14

    Enhancing secure QR code steganography through artificial intelligence: a conceptual framework by Roslan, Nuur Alifah, Lydia, Maya Silvi, Gutub, Adnan

    Published 2025
    “…It is imperative to employ resilient QR code algorithms to guarantee the security of QR code applications in response to this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
    Get full text
    Get full text
    Book Section