Search Results - (( developing human compression algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Parallelization of speech compression based algorithm based on human auditory system on multicore system by Gunawan, Teddy Surya, Kartiwi, Mira, Khalifa, Othman Omran

    Published 2012
    “…The objective of this research is to develop and implement a novel parallel speech compression algorithm based on human auditory system on a multicore system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Wavelets image data compression by Khalifa, Othman Omran, Dlay, Satnam Singh

    Published 1998
    “…Many techniques are now available^ and much effort is being expended in determining the oF(timum compression technique. Recently, compression techr/iques using Wavelet Transform (WT) have received gre:bt attention, because of their promising compression ratio, ‘flexibility in representing images and its ability to take into account Human Visual System. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Characterization of dumping soil and settlement prediction using Monte Carlo approach by Mohd Pauzi, Nur Irfah

    Published 2013
    “…Monte Carlo simulation is a method employed an algorithm that must be used with repeated random sampling of uncertainty for ca. 50-5000 number of iterations in order to obtain the parameters such as primary compression ratio (X), secondary compression ratio compressive stress X compressive stress(A) and ultimate settlement (Sult)of the soil at the dumping area. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Determination of energy usage and potential environment impact (pei) of a vapor compression distillation system for production of water for injection (wfi) in pharmaceutical indust... by Siti Nabihah, Abdul Latif

    Published 2014
    “…This paper presents the potential environment impact (PET) and energy usage studies of Water For Injection (WFI) manufacturing using vapor compression distillation (VCD) system. The amount of PET were analysed in waste reduction (WAR) algorithm using the amount of energy usage adapted from simulation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The data transformed into cognitive maps to supply the data warehouse. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan by Redzuan, Nur Amalina

    Published 2013
    “…The newspaper is documented in long sentences but the contents that express the sentiment is compressed and clearly understand by human. However, for the machine learning text representation it cause some problems because of the noisy text. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation by Salem Hussin, Saleh Hussin

    Published 2005
    “…The experimental results have shown that the proposed watermark is invisible to human eyes and very robust against image manipulation, such as JPEG compression, median filtering, wiener filtering, and noises.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Frame selection based on modified entropy and object motion for secured data hiding in videos by Muhammad Fuad, Abdullah

    Published 2021
    “…Thus, it is vital to develop a hiding information technique that requires a limited payload of hidden messages but it can be resistant against compression. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…During last two decades various speech coding algorithms have been developed. The range of toll speech frequency is from 300 Hz- 3400 Hz. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis