Search Results - (( developing local visualization algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- local visualization »
- java implementation »
- developing local »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…It is shown that simple local rules, together with visual experience, such as that provided by dynamic images, are sufficient for the development of the neural architectures. …”
Get full text
Get full text
Thesis -
8
EEG-based brain source localization using visual stimuli
Published 2016“…Various source localization algorithms have been developed to determine the exact locations of the active brain sources due to which electromagnetic activity is generated in brain. …”
Get full text
Get full text
Article -
9
Visualization of dengue incidences using expectation maximization (EM) algorithm
Published 2017“…R-GIS(R software) and clustering algorithm were used for year 2014 with several weeks to develop the relation between the visualization and prediction of reported incidences. …”
Get full text
Get full text
Article -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
12
Natural image noise level estimation based on local statistics for blind noise reduction
Published 2018“…For blind denoising applications, the proposed denoising algorithm integrates the undecimated wavelet-based denoising algorithms and PCA to develop the subjective and objective qualities of the observed image, which result from filtering processes. …”
Get full text
Get full text
Get full text
Article -
13
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…The purpose of this research is to detect the rust in oil tanks by localizing visual inspection technology using UAVs, as well as to develop algorithms to distinguish between defects and noise. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Design of artificial intelligence-based electronic Malay language learning tool for visually impaired children
Published 2011“…The advancement of technology in twenty-first century should provide more design of great learning devices. However in developing countries like Malaysia, there are limited locally made assistive devices to suit the language used and the local culture. …”
Get full text
Get full text
Thesis -
15
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
16
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Visual odometry and visual simultaneous localization and mapping aid in tracking the position of a camera and mapping the surroundings using images. …”
Get full text
Get full text
Article -
17
Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng
Published 2018“…The second contribution is an in-depth analysis of the collected data, specifically, by studying the global and local pixel intensities, followed by the performance and visualizations of hand-crafted and learned features. …”
Get full text
Get full text
Thesis -
18
Machine learning approach for automated optical inspection of electronic components
Published 2019“…This project proposed an automated optical inspection system implementing supervised machine learning algorithm and local features to inspect and classify defectiveness of surface mounted device light emitting diode into two classes: PASS and FAIL. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
Published 2023“…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Enhancement of medical image compression algorithm in noisy WLANS transmission
Published 2018“…Advances in telemedicine technology enable rapid medical diagnoses with visualization and quantitative assessment by medical practitioners.In healthcare and hospital networks,medical data exchange-based wireless local area network (WLAN) transceivers remain challenging because of their growing data size,real-time contact with compressed images,and range of bandwidths requiring transmission support.Prior to transmission,medical data are compressed to minimize transmission bandwidth and save transmitting power.Researchers address many challenges in improving performance of compression approaches.Such challenges include energy compaction, computational complexity,high entropy value,drive low compression ratio (CR) and high computational complexity in real-time implementation.Thus,a new approach called Enhanced Independent Component Analysis (EICA) for medical image compression has been developed to boost compression techniques;which transform the image data by block-based Independent Component Analysis (ICA).The proposed method uses Fast Independent Component Analysis (FastICA) algorithm followed by developed quantization architecture based zero quantized coefficients percentage (ZQCP) prediction model using artificial neural network. …”
Get full text
Get full text
Get full text
Thesis
