Search Results - (( data visualization using algorithm ) OR ( using communication using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    3D silhouette rendering algorithms using vectorisation technique from Kedah topography map by Che Mat, Ruzinoor, Nordin, Norani

    Published 2004
    “…This paper explores how silhouette rendering algorithms could be created using a data that have been extracted from Kedah topography map. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Besides, the algorithm enables an accurate prediction to the center of data eye with an even number of oversampling clock to data rate ratio. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Reversible Watermarking Based on Sorting Prediction Scheme by Fakhreldin, Mohammed Adam Ibrahim, Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir, Khalid, Adam

    Published 2014
    “…In this paper, we propose a reversible watermarking algorithm to improve Sachnev et al algorithm by using new sorting method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive algorithms for automated intruder detection in surveillance networks by Ahmed, Tarem, Pathan, Al-Sakib Khan, Ahmed, Supriyo

    Published 2014
    “…Built using machine learning techniques, the proposed algorithms are adaptive and portable, do not require any expensive or sophisticated component, are lightweight, and efficient with runtimes of the order of hundredths of a second. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…This paper proposed the NAGE method as a straight forward transformation from sequential to parallel algorithm using domain decomposition and splitting strategies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Pixel value differencing steganography techniques: Analysis and open challenge by Hussain, Mehdi, Wahab, Ainuddin Wahid Abdul, Anuar, Nor Badrul, Salleh, Rosli, Noor, Rafidah Md

    Published 2015
    “…Steganography is the science of secret data communication using carrier medium, such as images, videos, text, and networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin by Nordin, Daarin Nadia

    Published 2020
    “…Several charts such as dendrograms and sunburst charts are used to visualize the clustering results. The CASDSS is then tested through functionality and usability testing to ensure that system runs without any error and to obtain the targeted user’s feedback in utilizing the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Parallel batch self-organizing map on graphics processing unit using CUDA by Daneshpajouh, H., Delisle, P., Boisson, J.-C., Krajecki, M., Zakaria, N.

    Published 2018
    “…Batch Self-Organizing Map (Batch-SOM) is being successfully used for clustering and visualization of high-dimensional datasets in a wide variety of domains. …”
    Get full text
    Get full text
    Article
  19. 19

    Parallel batch self-organizing map on graphics processing unit using CUDA by Daneshpajouh, H., Delisle, P., Boisson, J.-C., Krajecki, M., Zakaria, N.

    Published 2018
    “…Batch Self-Organizing Map (Batch-SOM) is being successfully used for clustering and visualization of high-dimensional datasets in a wide variety of domains. …”
    Get full text
    Get full text
    Article
  20. 20