Search Results - ((compression algorithms) OR (detection algorithm))
Search alternatives:
- compression algorithms »
-
1
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
Get full text
Get full text
Thesis -
2
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
3
Evaluation of sparsifying algorithms for speech signals
Published 2012“…It has also played an important role in compressive sensing algorithms since it performs well in sparse signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
Get full text
Get full text
Thesis -
5
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
Get full text
Get full text
Article -
6
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
7
Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis
Published 2017“…The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm
Published 2016“…This paper proposes auto encoder neural network for compressing of high dimensional sensory data and classification using Fuzzy Unordered Rule Induction Algorithm (FURIA) with emphasis on detection and isolation of incipient faults. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
Get full text
Get full text
Thesis -
10
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, network compression and acceleration techniques such as pruning and quantization also been the focus of the studies for light-weight algorithms in embedded system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection
Published 2023Subjects: “…Fault Detection…”
Conference Paper -
12
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
Get full text
Get full text
Thesis -
13
Image authentication using Zernike moment watermarking
Published 2013“…Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. …”
Get full text
Get full text
Thesis -
14
Performance evaluation for compression-accuracy trade-off using compressive sensing for EEG-based epileptic seizure detection in wireless tele-monitoring
Published 2013“…A reconstructed algorithm derived from DCT of daubechie’s wavelet 6 is used to decompose the EEG signal at different levels. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The experimental results illustrate that the proposed algorithms are robust against several geometric changes, such as JPEG compression, rotation, noise, blurring, illumination variations, and scaling. …”
Get full text
Get full text
Thesis -
16
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…Integrating SSA and SVM machine learning algorithms improves decision-making processes, leading to better crop yield through early detection and timely nutrient management. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. …”
Get full text
Get full text
Article -
18
Robust watermarking using hand gesture for enhanced authentication
Published 2011“…In this work, a gesture authentication system built with a robust watermark algorithm is presented. This biometric authentication system is divided into two modules, which are watermark embedding module and watermark detection module. …”
Get full text
Get full text
Article -
19
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
Get full text
Get full text
Thesis -
20
Optimization of coded signals based on wavelet neural network
Published 2015“…Pulse compression technique is used in many modern radar signal processing systems to achieve the range accuracy and resolution of a narrow pulse while retaining the detection capability of a long pulse. …”
Get full text
Get full text
Get full text
Get full text
Thesis
