Search Results - (( java implication tree algorithm ) OR ( using quality filing algorithm ))

Refine Results
  1. 1

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…Beside that, the quality of image that can be produced by LZW algorithm and RLE algorithm is almost the same.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin by Mohd Aminnuddin, Farabi Aizat

    Published 2019
    “…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4
  5. 5

    On the Identification of FOSD-based Non-zero Onset Speech Dataset by Tran, D.C., Ibrahim, R.

    Published 2020
    “…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong by Lam , Wai Leong

    Published 2006
    “…This project proves that a generic compression algorithm fair better compare to a more format specific compression algorithm when use on a scientific datasets. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography by Alsabhany, A.A., Mohd Ridzuan, F.H., Azni Hazlizan Ab Halim

    Published 2024
    “…The algorithm uses AES-256 to increase the level of robustness. …”
    Article
  10. 10

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    An intermediate significant bit (ISB) watermarking technique using neural networks by Zeki, A., Abubakar, A., Chiroma, H.

    Published 2016
    “…Many researchers have used these approaches to evaluate their algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…Cloud computing uses scheduling and load balancing for virtualized file sharing in cloud infrastructure. …”
    Get full text
    Get full text
    Article
  15. 15

    Parallelization of speech compression based algorithm based on human auditory system on multicore system by Gunawan, Teddy Surya, Kartiwi, Mira, Khalifa, Othman Omran

    Published 2012
    “…Matlab parallel computing toolbox was used in the implementation. Finally, the performance of the developed parallel algorithm was evaluated using Perceptual Evaluation of Speech Quality (PESQ) and parallel execution time. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain by Shaker Hussain, Hanizan

    Published 2014
    “…Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm. Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…This thesis proposed an efficient algorithm, namely, the Quality of Service (QoS) and Energy Efficient Aware (QEEA). …”
    Get full text
    Get full text
    Thesis
  20. 20

    QoS based admission control using multipath scheduler for IP over satellite networks by Audah, Lukman, Sun, Zhili, Cruickshank, Haitham

    Published 2017
    “…This paper presents a novel scheduling algorithm to support quality of service (QoS) for multiservice applications over integrated satellite and terrestrial networks using admission control system with multipath selection capabilities. …”
    Get full text
    Get full text
    Article