Search Results - (( using factor scheme algorithm ) OR ( java application reoptimize algorithm ))

Refine Results
  1. 1

    An adaptive scaling factor for multiple watermarking scheme by Dhani, Ariatmanto, Ernawan, Ferda

    Published 2019
    “…This experiment examines DCT coefficients in the middle frequency to obtain adaptive scaling factor for embedding a watermark. The proposed algorithm used the impact of selected DCT coefficients to imperceptibility and robustness for generating t adaptive scaling factor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Multigrid solution of Euler equations using high-resolution NVD differencing scheme for unstructured meshes by Ng K.C., Yusoff M.Z., Ng E.Y.K.

    Published 2023
    “…The efficiencies of the GAMMA scheme and its variant have been augmented with a novel agglomeration multigrid scheme to accelerate the convergence to steady state using the multi-stage Runge-Kutta time-marching technique. …”
    Article
  4. 4

    A new multi-frames watermarking technique for tamper detection and recovery by Khor, Hui Liang

    Published 2017
    “…The higher speed up factor in TALLOR indicated that the performance of the proposed multi-frames watermarking scheme is affected by the algorithm complexity of the adopted watermarking scheme and the number of frames in medical images processed.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
    Get full text
    Get full text
    Thesis
  6. 6

    New methods of partial transmit sequence for reducing the high peak-to-average-power ratio with low complexity in the ofdm and f-ofdm systems by Abduljabbar, Yasir Amer

    Published 2019
    “…Secondly, two novel algorithms, Grouping Complex iterations algorithm (G-C-PTS), and Gray Code Phase Factor algorithm (Gray-PF-PTS) have been developed to reduce the computational complexity for finding the optimum phase rotation factors in the time domain part of the PTS structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics by Abbas, Sharafal-Deen Abdulkadhum

    Published 2016
    “…The implementation stage is taken two different simulators has been used, the first one which is the optical simulator is used to collect the initial optical data then, MATLAB is used to develop the equalisation scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…The simulation results highlighted that the proposed algorithms (MR-CSA and MR-DSA) outperform all previous algorithms with the current signaling scheme. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Chain code algorithm in deriving T-Junction and region of a freehand sketch by Haron, Habibollah, Shamsuddin, Siti Mariyam, Mohamed, Dzulkifli

    Published 2004
    “…Chain code scheme is one of the Picture Description Languages used to represent lines. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Active authentication by one time password based on unique factor and behavioral biometric by Hussein, Khalid Waleed, Mohd. Sani, Nor Fazlida, Mahmod, Ramlan, Abdullah@Selimun, Mohd. Taufik

    Published 2013
    “…However, existing OTP schemes suffer from several drawbacks. Moreover, OTP schemes are vulnerable either because of a weakness in hardware devices (e.g., token devices that apply OTP schemes) or because of the use of weak algorithms or methods to generate OTP. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Adaptive-model based self-tuning generalized predictive control of a biodiesel reactor / Ho Yong Kuen by Ho, Yong Kuen

    Published 2011
    “…Traditionally, the Recursive Least Squares (RLS) algorithm was used in the Generalized Predictive Control (GPC) framework solely for model adaptation purposes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…A dynamic user-wise algorithm is proposed to resolve this problem. In depth comparison among these schemes using different metrics like average sum-rate per cell, data rate and feedback rate demonstrates the better performance of centralized cooperation over partial cooperation with higher backhaul load. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  20. 20