Search Results - (( data transformation issues algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…Traditional data transformation methods such as Extract-Transform-Load (ETL) use data sources from a diverse range of devices and locations resulting in incomplete and inconsistent DQ that may lead to wrong insights and decisions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…Data gathering is among the issues constantly acquiring attention in the area of Wireless Sensor Networks (WSNs) due to its impact and ability to transform many areas associated with the human life. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM by Abdullah, Khaizuran, Hussain, Zahir M.

    Published 2011
    “…Due to these issues, an alternative method is to use the wavelet transform to replace the IFFT and FFT blocks. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Forecasting Solar Power Using Hybrid Firefly and Particle Swarm Optimization (HFPSO) for Optimizing the Parameters in a Wavelet Transform-Adaptive Neuro Fuzzy Inference System (WT-... by Abdullah, Nor Azliana, Rahim, Nasrudin Abd, Gan, Chin Kim, Nor Adzman, Noriah

    Published 2019
    “…This work proposes a forecasting model called WT-ANFIS-HFPSO which combines the wavelet transform (WT), adaptive neuro-fuzzy inference system (ANFIS) and hybrid firefly and particle swarm optimization algorithm (HFPSO). …”
    Get full text
    Get full text
    Article
  9. 9

    The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV) by MOHD SHARFRI, RAIHAN AMALINA

    Published 2017
    “…Temporal and spatial resolution are two key issues in the analysis of PIV data which often compromises each other. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Forecasting Solar Power Using Hybrid Firefly And Particle Swarm Optimization (HFPSO) For Optimizing The Parameters In A Wavelet Transform-Adaptive Neuro Fuzzy Inference System (WT-... by Abd Rahim, Nasrudin, Gan, Chin Kim, Abdullah, Nor Azliana, Adzman, Noriah Nor

    Published 2019
    “…This work proposes a forecasting model called WT-ANFIS-HFPSO which combines the wavelet transform (WT), adaptive neuro-fuzzy inference system (ANFIS) and hybrid firefly and particle swarm optimization algorithm (HFPSO). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…Data pre-processing method carries out certain computations such as data transformation (normalization, aggregation) to improve data quality. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Then, by means of the Slantlet Transform theory, the matrix data extraction for any decomposition level are computed and the best of them are selected as input data to feed to an effective classifier. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A Framework For Privacy Diagnosis And Preservation In Data Publishing by Mirakabad, Mohammad Reza Zare

    Published 2010
    “…Accordingly, privacy preservation techniques, namely k-anonymization and l-diversification algorithms, transform data (for example by generalization, suppression or fragmentation) to protect identity and sensitive information of individuals respectively.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Therefore how to protect secret messages during transmission becomes an important issue. Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…At the moment, the most critical issue faced by the watermarking system is determining the best place to hide watermark data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20