Search Results - (( spatial visualization techniques algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- visualization techniques »
- spatial visualization »
- java implementation »
- implementation case »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…Dynamic weather elements such as rain cause complex visual appearance, because rain consists of spatially distributed drops falling at high velocities. …”
Get full text
Get full text
Thesis -
3
Challenges in multi-layer data security for video steganography
Published 2018“…Thus, in this paper a review on multi-layer algorithms for video steganography is done. This paper comprehensively reviews the steganography, spatial and frequency domain techniques hybrid with cryptography and error correction techniques. …”
Get full text
Get full text
Get full text
Article -
4
Pixel value differencing steganography techniques: Analysis and open challenge
Published 2015Get full text
Get full text
Conference or Workshop Item -
5
-
6
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
8
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
9
-
10
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
11
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The system is able to identify the possibility of cross contamination by examining the vehicle stoppage via geofence technique. The existing geofence technique was upgraded by integrating spatial, temporal and speed rule in the ray casting algorithm used for this technique. …”
Get full text
Get full text
Thesis -
12
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
15
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
Get full text
Get full text
Monograph -
16
EEG-based brain source localization using visual stimuli
Published 2016“…According to the spatial resolution provided, the algorithms are categorized as either low resolution methods or high resolution methods. …”
Get full text
Get full text
Article -
17
Content-based indexing of low resolution documents
Published 2016“…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Spatial analysis of infant mortality in Peninsular Malaysia over three decades using mixture models
Published 2013“…The results obtained were visually presented in maps. The analysis showed that in the early year of 1970, the spatial heterogeneity effect was more prominent; however, towards the end of 1990, this pattern tended to disappear. …”
Get full text
Get full text
Get full text
Article -
19
A review of machine learning in hyperspectral imaging for food safety
Published 2025“…To address these limitations, advances in non-destructive monitoring techniques with the implementation of machine learning (ML) algorithms can be alternative solutions. …”
Get full text
Get full text
Get full text
Article -
20
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Volumetric is one type of spatial object in the VGIS, which is used to visualize 3D information. …”
Get full text
Get full text
Monograph
