Search Results - (( developing local visualization algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…It is shown that simple local rules, together with visual experience, such as that provided by dynamic images, are sufficient for the development of the neural architectures. …”
    Get full text
    Get full text
    Thesis
  8. 8

    EEG-based brain source localization using visual stimuli by Jatoi, M.A., Kamel, N., Malik, A.S., Faye, I., Bornot, J.M., Begum, T.

    Published 2016
    “…Various source localization algorithms have been developed to determine the exact locations of the active brain sources due to which electromagnetic activity is generated in brain. …”
    Get full text
    Get full text
    Article
  9. 9

    Visualization of dengue incidences using expectation maximization (EM) algorithm by Mathur, N., Asirvadam, V.S., Dass, S.C., Gill, B.S.

    Published 2017
    “…R-GIS(R software) and clustering algorithm were used for year 2014 with several weeks to develop the relation between the visualization and prediction of reported incidences. …”
    Get full text
    Get full text
    Article
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Natural image noise level estimation based on local statistics for blind noise reduction by Khmag, Asem, Ramli, Abd Rahman, Sy Mohamed, Sy Abd Rahman Al-haddad, Kamarudin, Noraziahtulhidayu

    Published 2018
    “…For blind denoising applications, the proposed denoising algorithm integrates the undecimated wavelet-based denoising algorithms and PCA to develop the subjective and objective qualities of the observed image, which result from filtering processes. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Design of artificial intelligence-based electronic Malay language learning tool for visually impaired children by Yeoh, Sing Hsia

    Published 2011
    “…The advancement of technology in twenty-first century should provide more design of great learning devices. However in developing countries like Malaysia, there are limited locally made assistive devices to suit the language used and the local culture. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…The algorithm was developed in Visual Basic 6.0v programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Visual odometry and visual simultaneous localization and mapping aid in tracking the position of a camera and mapping the surroundings using images. …”
    Get full text
    Get full text
    Article
  17. 17

    Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng by Loh , Yuen Peng

    Published 2018
    “…The second contribution is an in-depth analysis of the collected data, specifically, by studying the global and local pixel intensities, followed by the performance and visualizations of hand-crafted and learned features. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Machine learning approach for automated optical inspection of electronic components by Lim, Siew Kee

    Published 2019
    “…This project proposed an automated optical inspection system implementing supervised machine learning algorithm and local features to inspect and classify defectiveness of surface mounted device light emitting diode into two classes: PASS and FAIL. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection by Wong, Shu Jie

    Published 2023
    “…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Enhancement of medical image compression algorithm in noisy WLANS transmission by Algaet, Mustafa Almahdi

    Published 2018
    “…Advances in telemedicine technology enable rapid medical diagnoses with visualization and quantitative assessment by medical practitioners.In healthcare and hospital networks,medical data exchange-based wireless local area network (WLAN) transceivers remain challenging because of their growing data size,real-time contact with compressed images,and range of bandwidths requiring transmission support.Prior to transmission,medical data are compressed to minimize transmission bandwidth and save transmitting power.Researchers address many challenges in improving performance of compression approaches.Such challenges include energy compaction, computational complexity,high entropy value,drive low compression ratio (CR) and high computational complexity in real-time implementation.Thus,a new approach called Enhanced Independent Component Analysis (EICA) for medical image compression has been developed to boost compression techniques;which transform the image data by block-based Independent Component Analysis (ICA).The proposed method uses Fast Independent Component Analysis (FastICA) algorithm followed by developed quantization architecture based zero quantized coefficients percentage (ZQCP) prediction model using artificial neural network. …”
    Get full text
    Get full text
    Get full text
    Thesis