Search Results - (( developing image compression algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- developing image »
- level algorithm »
- compression »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…This study aims to use Wavelet Transform Algorithm for image compression. Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis -
3
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. …”
Get full text
Get full text
Thesis -
4
Enhancement of medical image compression algorithm in noisy WLANS transmission
Published 2018“…Advances in telemedicine technology enable rapid medical diagnoses with visualization and quantitative assessment by medical practitioners.In healthcare and hospital networks,medical data exchange-based wireless local area network (WLAN) transceivers remain challenging because of their growing data size,real-time contact with compressed images,and range of bandwidths requiring transmission support.Prior to transmission,medical data are compressed to minimize transmission bandwidth and save transmitting power.Researchers address many challenges in improving performance of compression approaches.Such challenges include energy compaction, computational complexity,high entropy value,drive low compression ratio (CR) and high computational complexity in real-time implementation.Thus,a new approach called Enhanced Independent Component Analysis (EICA) for medical image compression has been developed to boost compression techniques;which transform the image data by block-based Independent Component Analysis (ICA).The proposed method uses Fast Independent Component Analysis (FastICA) algorithm followed by developed quantization architecture based zero quantized coefficients percentage (ZQCP) prediction model using artificial neural network. …”
Get full text
Get full text
Get full text
Thesis -
5
Measuring the performance of image data by using RLE algorithm in lossless compression technique
Published 2015“…In the research, there are one technique that will selected for this problem which is Run-Length Encoding algorithm. From this technique, it will be develop the high quality of data by reducing the size of image but give a high quality of image. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Image compression and decompression techniques for future application in transmission to remote monitoring center using telephone network: software development / Alwi Hasrat
Published 1995“…This thesis proposes a software development of image data compression and decompression techniques. …”
Get full text
Get full text
Thesis -
8
-
9
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
10
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…It is proved that the algorithm has better compression performance for difference images compared to conventional DCT. …”
Get full text
Get full text
Final Year Project -
11
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…One of the essential factors that affect the performance of Artificial Neural Networks is the learning algorithm. The performance of Multilayer Feed Forward Artificial Neural Network performance in image compression using different learning algorithms is examined in this paper. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Wavelets image data compression
Published 1998“…The fairt development of multimedia computing has led to the ibemand of using digital images. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Data hiding in medical images using encryption and steganography techniques
Published 2019“…A stego-image will be generated and compressed using Discrete Cosine Transform to reduce the size of stego- image in order to save storage. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Review of wavelet theory and its application to image data compression
Published 2003“…The fast development of computing multimedia has led to the demand of using digital images. …”
Get full text
Get full text
Get full text
Article -
17
WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2008“…The result from both approaches for images shows marginal improvement at higher compression ratio. …”
Get full text
Get full text
Final Year Project -
18
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Due to the fast development of powerful image processing tools and the importance of image integrity, digital image forgery has become a very important topic for certain organizations. …”
Get full text
Get full text
Thesis -
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
20
Image authentication using Zernike moment watermarking
Published 2013“…The rapid development of internet and digital image editing softwares facilitated the access and illegal usage of digital images. …”
Get full text
Get full text
Thesis
