Search Results - (( programming image compression algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- programming image »
- java application »
- mining algorithm »
- compression »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Parallelization Of CCSDS Hyperspectral Image Compression Using C++
Published 2018“…The first step of the research is converting the CCSDS-MHC algorithm into a full program in C++, with both compression and decompression features. …”
Get full text
Get full text
Monograph -
3
-
4
-
5
CUDA implementation of fractal image compression
Published 2023“…Encoding (symbols); Fractals; Graphics processing unit; Image coding; Program processors; Signal encoding; Signal to noise ratio; CUDA; Fractal image compression; Fractal image compression algorithm; Graphical processing unit (GPUs); Lossy image compression; Parallel processing; Peak signal to noise ratio; Quad-tree partitioning; Image compression…”
Article -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
12
Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek
Published 2016“…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
Get full text
Get full text
Research Reports -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
Implementation of wavelet codec by using Texas Instruments DSP TMS320C6701 EVM board
Published 2001“…The wavelet codec is used to compress and decompress gray scale images for real time data compression. …”
Get full text
Get full text
Get full text
Article -
15
Development of Lifting-based VLSI Architectures for Two-Dimensional Discrete Wavelet Transform
Published 2010“…This research iaitially started off by implementing a software simulation program that decorrelates the original image and reconstructs the original image from the decorrelated image. …”
Get full text
Get full text
Thesis -
16
Handwriting recognition using webcam for data entry
Published 2014“…However, the testing were later enhanced with another feature extraction module, which consists of the combination of Character Vector Module, Kirsch Edge Detection Module, Alphabet Profile Feature Extraction Module, Modified Character Module and Image Compression Module. The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Final Year Project -
17
Handwriting recognition using webcam for data entry
Published 2015“…However, the testing were later enhanced with another feature extraction module, which consists of the combination of Character Vector Module, Kirsch Edge Detection Module, Alphabet Profile Feature Extraction Module, Modified Character Module and Image Compression Module. The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Conference or Workshop Item
