Search Results - (( data transformation issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- transformation issues »
- data transformation »
- implication based »
- issues algorithm »
- java implication »
-
1
-
2
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
3
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…Traditional data transformation methods such as Extract-Transform-Load (ETL) use data sources from a diverse range of devices and locations resulting in incomplete and inconsistent DQ that may lead to wrong insights and decisions. …”
Get full text
Get full text
Get full text
Thesis -
4
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
5
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…Data gathering is among the issues constantly acquiring attention in the area of Wireless Sensor Networks (WSNs) due to its impact and ability to transform many areas associated with the human life. …”
Get full text
Get full text
Thesis -
7
Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM
Published 2011“…Due to these issues, an alternative method is to use the wavelet transform to replace the IFFT and FFT blocks. …”
Get full text
Get full text
Get full text
Book Chapter -
8
Forecasting Solar Power Using Hybrid Firefly and Particle Swarm Optimization (HFPSO) for Optimizing the Parameters in a Wavelet Transform-Adaptive Neuro Fuzzy Inference System (WT-...
Published 2019“…This work proposes a forecasting model called WT-ANFIS-HFPSO which combines the wavelet transform (WT), adaptive neuro-fuzzy inference system (ANFIS) and hybrid firefly and particle swarm optimization algorithm (HFPSO). …”
Get full text
Get full text
Article -
9
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…Temporal and spatial resolution are two key issues in the analysis of PIV data which often compromises each other. …”
Get full text
Get full text
Final Year Project -
10
Forecasting Solar Power Using Hybrid Firefly And Particle Swarm Optimization (HFPSO) For Optimizing The Parameters In A Wavelet Transform-Adaptive Neuro Fuzzy Inference System (WT-...
Published 2019“…This work proposes a forecasting model called WT-ANFIS-HFPSO which combines the wavelet transform (WT), adaptive neuro-fuzzy inference system (ANFIS) and hybrid firefly and particle swarm optimization algorithm (HFPSO). …”
Get full text
Get full text
Get full text
Article -
11
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…Data pre-processing method carries out certain computations such as data transformation (normalization, aggregation) to improve data quality. …”
Get full text
Get full text
Student Project -
12
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Then, by means of the Slantlet Transform theory, the matrix data extraction for any decomposition level are computed and the best of them are selected as input data to feed to an effective classifier. …”
Get full text
Get full text
Thesis -
13
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
14
A Framework For Privacy Diagnosis And Preservation In Data Publishing
Published 2010“…Accordingly, privacy preservation techniques, namely k-anonymization and l-diversification algorithms, transform data (for example by generalization, suppression or fragmentation) to protect identity and sensitive information of individuals respectively.…”
Get full text
Get full text
Thesis -
15
Data Hiding Techniques In Digital Images
Published 2003“…Therefore how to protect secret messages during transmission becomes an important issue. Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
16
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…At the moment, the most critical issue faced by the watermarking system is determining the best place to hide watermark data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Intelligent decision support systems: transforming smart cities management
Published 2024Get full text
Get full text
Get full text
Get full text
Proceeding Paper
