Search Results - (( development content coding algorithm ) OR ( java application reoptimize algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…The result shows that the DOS-SDSP algorithm has the lowest search points with only 1.7341, 4.9059 and 4.0230 for each motion’s content respectively; meanwhile all the algorithms acquired similar and close PSNR values for all types of motion contents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…In video coding, research is focused on the development of fast motion estimation (ME) algorithms while keeping the coding distortion as small as possible. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    PCB defect detection system using run-length encoding by Zakaria, Muhammad Anif

    Published 2017
    “…Each of the analysis windows contents the RLE code. Each of the RLE code of the test image will be compared with the RLE code of the original image. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Form four chemistry teachers’ conceptualization of pedagogical content knowledge / Chien Lee Shing by Chien, Lee Shing

    Published 2016
    “…The coding of the data was guided by the research questions and new themes were allowed to emerge from the data. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…In Human motion analysis, the algorithm that used for detection is Histogram of Gradient, followed by Optical Flow coding for a better demonstration of the direction and magnitude of the flow which indicated by a moving object. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…Both architectures gave precise results for different selections of chirp rate that could fit with system specifications. The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates by Eu, Jin Hau

    Published 2025
    “…This study highlights a broader shift in digital literacy, in which students actively engage with emotionally resonant and socially validated content rather than passively consuming it. The findings have practical implications for educators, marketers, and platform developers who want to tailor communication strategies to the preferences of young audiences. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Automated Malicious File Investigation by RAMA ROA, SHARVITA

    Published 2020
    “…This system will be developed by using waterfall methodology because waterfall methodology is the most suitable as the knowledge on required algorithms and techniques are described in this report. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Design of intelligent control system and its application on fabricated conveyor belt grain dryer by Lutfy, Omar F.

    Published 2011
    “…Moreover, three evolutionary algorithms (EAs), in particular a real-coded genetic algorithm (GA), a particle swarm optimization (PSO), and a global-best harmony search (GHS), were separately used to train the proposed controller and to determine its scaling factors. …”
    Get full text
    Get full text
    Thesis