Search Results - (( spatial visualization techniques algorithm ) OR ( java application customization algorithm ))*
Search alternatives:
- visualization techniques »
- customization algorithm »
- spatial visualization »
- java application »
-
1
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…Dynamic weather elements such as rain cause complex visual appearance, because rain consists of spatially distributed drops falling at high velocities. …”
Get full text
Get full text
Thesis -
2
Challenges in multi-layer data security for video steganography
Published 2018“…Thus, in this paper a review on multi-layer algorithms for video steganography is done. This paper comprehensively reviews the steganography, spatial and frequency domain techniques hybrid with cryptography and error correction techniques. …”
Get full text
Get full text
Get full text
Article -
3
Pixel value differencing steganography techniques: Analysis and open challenge
Published 2015Get full text
Get full text
Conference or Workshop Item -
4
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The system is able to identify the possibility of cross contamination by examining the vehicle stoppage via geofence technique. The existing geofence technique was upgraded by integrating spatial, temporal and speed rule in the ray casting algorithm used for this technique. …”
Get full text
Get full text
Thesis -
5
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
Get full text
Get full text
Monograph -
7
EEG-based brain source localization using visual stimuli
Published 2016“…According to the spatial resolution provided, the algorithms are categorized as either low resolution methods or high resolution methods. …”
Get full text
Get full text
Article -
8
Content-based indexing of low resolution documents
Published 2016“…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Spatial analysis of infant mortality in Peninsular Malaysia over three decades using mixture models
Published 2013“…The results obtained were visually presented in maps. The analysis showed that in the early year of 1970, the spatial heterogeneity effect was more prominent; however, towards the end of 1990, this pattern tended to disappear. …”
Get full text
Get full text
Get full text
Article -
10
A review of machine learning in hyperspectral imaging for food safety
Published 2025“…To address these limitations, advances in non-destructive monitoring techniques with the implementation of machine learning (ML) algorithms can be alternative solutions. …”
Get full text
Get full text
Get full text
Article -
11
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Volumetric is one type of spatial object in the VGIS, which is used to visualize 3D information. …”
Get full text
Get full text
Monograph -
12
Programmable Spatially Variant Single Pixel Imaging Based On Compressive Sensing
Published 2021“…However, high pixel-to-pixel fidelity recovery is not always needed in most visual tasks. This thesis proposes a programmable spatially variant resolution (SVR) technique in single-pixel imaging based on CS. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…The proposed algorithm is designed in order to tackle many limitations of the existing algorithms such as handle inevitable occlusions, model different motions from multiple moving objects, and consider the spatial information.…”
Get full text
Get full text
Get full text
Thesis -
14
Real-time shadow casting using fake soft shadow volume with stencil buffer
Published 2006“…Comparison using proposed algorithm with an established algorithm revealed that the proposed algorithm is two to five times faster. …”
Get full text
Get full text
Thesis -
15
Enhancing the Yolov8 algorithm for real-time dental segmentation
Published 2025“…The goal of image segmentation is to group pixels based on visual properties such as color, texture, intensity, or spatial proximity to identify and delineate the boundaries of distinct objects or regions within the image. …”
Get full text
Get full text
Thesis -
16
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…In the third algorithm, a soft assignment technique using fuzzy encoding is used to transform low-level features into a higher-level feature representation. …”
Get full text
Get full text
Thesis -
17
Markov-Gibbs Random Field Approach for Modeling of Skin Surface Textures
Published 2008“…For set 2 the wrinkle/line like features can be modeled with low/medium visual similarity depending on the spatial invariance. …”
Get full text
Get full text
Final Year Project -
18
MMS : mobile monitoring system using electrical capacitance tomography (ECT)
Published 2008“…The reconstruction image process in the PC was written using programming platform Visual Basic 6.0. The information obtained in the PC can be reconstructed using linear back projection algorithm. …”
Get full text
Get full text
Monograph -
19
Dynamic scene occlusion culling in architectural scenes based on dynamic bounding volume
Published 2006“…Therefore, occlusion culling techniques are required for output-sensitive rendering. …”
Get full text
Get full text
Thesis -
20
Statistical Approach for Image Retrieval
Published 2007“…Of all the visual contents identifiable from an image, colour is considered to be the commonest visual attribute that aids in image retrieval. …”
Get full text
Get full text
Thesis
