Search Results - (( image interpolation using algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    Image resolution enhancement using improved edge directed interpolation algorithm / Md Shamim Hossain by Md Shamim , Hossain

    Published 2018
    “…This method is applied in many image processing field. One of the commonly used techniques for image resolution enhancement is interpolation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Image resolution enhancement using improved edge directed interpolation algorithm by Hossain, Md Shamim, Jalab, Hamid A., Kahtan, Hasan, Azma, Abdullah

    Published 2019
    “…This method is applied in many image processing field. One of the commonly used techniques for image resolution enhancement is interpolation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Rational Bi-Quartic Spline with Six Parameters for Surface Interpolation with Application in Image Enlargement by Karim, S.A.A.

    Published 2020
    “…The proposed rational bi-quartic spline will be used to interpolate the missing pixel in image interpolation. …”
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Dual-thresholding based sinogram interpolation To reduce metal artefact In Computed tomography imaging by Mohamad sobri, Nurul Fathin

    Published 2021
    “…Theinterpolated sinogram was then reconstructed using backprojection (byinverseRadon function) and finally the thresholded and interpolated images were fusedtoproduce corrected image. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…Then, the missing data are replaced by interpolated values by using the spline cubic interpolation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    New Digital Images Magnification Algorithm Based on Integration of Mapping and Synthesis Concept by Abu Amro, Rawia M.A.

    Published 2016
    “…As the synthesis concept has been used in patch based texture synthesis algorithms, a modification to the patch based texture synthesis algorithms has to be carried out in order to use it for the image magnification purpose. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB) by Hashim, Nurul Akmal

    Published 2017
    “…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Shallow-water mapping at Pantai Tok Jembal, Terengganu, Malaysia, using Lansat 8 (OLI) / Nur Syahirah Hashim by Hashim, Nur Syahirah

    Published 2021
    “…Therefore, the idea of using spatial interpolation could be a suitable approach in solving the problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The image was then segmented into smaller parts using pixel-region-based image segmentation method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Depth Image Layers Separation (DILS) algorithm of image view synthesis based on stereo vision by Abd Manap, Nurulfajar, Soraghan, John J., Petropoulakis, Lykourgos

    Published 2013
    “…The DILS algorithm can be implemented using both simple as well as sophisticated stereo matching methods to synthesize inter-view images.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  20. 20