Search Results - (( java implementation modified algorithm ) OR ( basic _ compression algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Speech Compression Using Discrete Wavelet Transform
Published 2003“…Software simulating the lossy compression scheme is developed using Matlab 6. This software provides the basic speech analysis as well as the compression and decompression operations. …”
Get full text
Get full text
Thesis -
6
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
7
TEMPERATURE CONTROLLER FOR AUTOMOTIVE ENGINE RESEARCH
Published 2009“…This report basically discusses the preliminary research done and basic understanding of the chosen topic, which is Temperature Controller for Automotive engine Research. …”
Get full text
Get full text
Final Year Project -
8
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Basically, the proposed of FUHS16, UHDS16 and UHDS8 algorithm produces the best motion vector estimation finding based on the block-based matching criteria. …”
Get full text
Get full text
Get full text
Book Chapter -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Performance Analysis of Motion Estimation Algorithms on Digital Video Images
Published 2011“…In the BMME, search patterns with different shapes or sizes and the center-biased characteristics of motion vector (MV) have large impact on the search speed (search points) and peak signal-to-noise ratio (PSNR) as the quality of video images. These basic algorithms are Full Search and other two fast search methods. …”
Get full text
Get full text
Article -
11
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…The compression algorithm must also preserve original information in the original image. …”
Get full text
Get full text
Thesis -
12
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…In this study, after planning and conducting a series of laboratory works, some basic properties of marine clay treated with recycled tiles together with their unconfined compressive strength (UCS) values were obtained. …”
Get full text
Get full text
Article -
13
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…In this study, after planning and conducting a series of laboratory works, some basic properties of marine clay treated with recycled tiles together with their unconfined compressive strength (UCS) values were obtained. …”
Get full text
Get full text
Article -
14
Algorithm development for optimization of a refrigeration system
Published 2010“…This thesis deals with algorithm development for optimization of a refrigeration system. …”
Get full text
Get full text
Undergraduates Project Papers -
15
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With the same compression properties, this encryption algorithm was shown to be able to produce average file size smaller than baseline JPEG and other encryption. …”
Get full text
Get full text
Thesis -
16
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…Embedding a secret image in steganography without causing distortion or detection is challenging due to image size constraints, which require compression. This compression can lead to content loss and makes the hidden data vulnerable to steganalysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
SOLID-STATE MP3 PLAYER
Published 2005“… • A decoder to run a decompression algorithm that undoes the compression of the MP3 file and then a digital-to-analog converter turns the bytes back into waves…”
Get full text
Get full text
Final Year Project -
20
