Search Results - (( development content coding algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- development content »
- coding algorithm »
- java application »
- content coding »
-
1
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…The result shows that the DOS-SDSP algorithm has the lowest search points with only 1.7341, 4.9059 and 4.0230 for each motion’s content respectively; meanwhile all the algorithms acquired similar and close PSNR values for all types of motion contents. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…In video coding, research is focused on the development of fast motion estimation (ME) algorithms while keeping the coding distortion as small as possible. …”
Get full text
Get full text
Get full text
Article -
4
PCB defect detection system using run-length encoding
Published 2017“…Each of the analysis windows contents the RLE code. Each of the RLE code of the test image will be compared with the RLE code of the original image. …”
Get full text
Get full text
Student Project -
5
Form four chemistry teachers’ conceptualization of pedagogical content knowledge / Chien Lee Shing
Published 2016“…The coding of the data was guided by the research questions and new themes were allowed to emerge from the data. …”
Get full text
Get full text
Thesis -
6
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
7
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
Get full text
Get full text
Get full text
Thesis -
8
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…In Human motion analysis, the algorithm that used for detection is Histogram of Gradient, followed by Optical Flow coding for a better demonstration of the direction and magnitude of the flow which indicated by a moving object. …”
Get full text
Get full text
Final Year Project -
9
-
10
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
11
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
Get full text
Get full text
Thesis -
12
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…Both architectures gave precise results for different selections of chirp rate that could fit with system specifications. The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
13
The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates
Published 2025“…This study highlights a broader shift in digital literacy, in which students actively engage with emotionally resonant and socially validated content rather than passively consuming it. The findings have practical implications for educators, marketers, and platform developers who want to tailor communication strategies to the preferences of young audiences. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Automated Malicious File Investigation
Published 2020“…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
Get full text
Get full text
Final Year Project -
15
-
16
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
Get full text
Get full text
Thesis -
17
-
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
19
Design of intelligent control system and its application on fabricated conveyor belt grain dryer
Published 2011“…Moreover, three evolutionary algorithms (EAs), in particular a real-coded genetic algorithm (GA), a particle swarm optimization (PSO), and a global-best harmony search (GHS), were separately used to train the proposed controller and to determine its scaling factors. …”
Get full text
Get full text
Thesis
