Search Results - (( using quality filing algorithm ) OR ( java application using algorithm ))
Search alternatives:
- filing algorithm »
- java application »
- using algorithm »
- quality filing »
-
1
-
2
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
3
A Comparative Study on Compression of Different Image File Formats
Published 1999“…Beside that, the quality of image that can be produced by LZW algorithm and RLE algorithm is almost the same.…”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
Published 2019“…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
Get full text
Get full text
Student Project -
8
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
-
12
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020“…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
Get full text
Get full text
Conference or Workshop Item -
13
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
Get full text
Get full text
Thesis -
14
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This project proves that a generic compression algorithm fair better compare to a more format specific compression algorithm when use on a scientific datasets. …”
Get full text
Get full text
Thesis -
16
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
17
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
18
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography
Published 2024“…The algorithm uses AES-256 to increase the level of robustness. …”
Article -
20
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis
