Search Results - ((compression algorithms) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluation of sparsifying algorithms for speech signals by Kassim, Liban A., Khalifa, Othman Omran, Gunawan, Teddy Surya

    Published 2012
    “…It has also played an important role in compressive sensing algorithms since it performs well in sparse signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
    Get full text
    Get full text
    Article
  6. 6

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm by Htike@Muhammad Yusof, Zaw Zaw, Nyein Naing, Wai Yan

    Published 2016
    “…This paper proposes auto encoder neural network for compressing of high dimensional sensory data and classification using Fuzzy Unordered Rule Induction Algorithm (FURIA) with emphasis on detection and isolation of incipient faults. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems by Uwaechia, Anthony Ngozichukwuka

    Published 2018
    “…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…On the other hand, network compression and acceleration techniques such as pruning and quantization also been the focus of the studies for light-weight algorithms in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation for compression-accuracy trade-off using compressive sensing for EEG-based epileptic seizure detection in wireless tele-monitoring by Abualsaud, Khalid, Mahmuddin, Massudi, Hussein, Ramy, Mohamed, Amr

    Published 2013
    “…A reconstructed algorithm derived from DCT of daubechie’s wavelet 6 is used to decompose the EEG signal at different levels. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The experimental results illustrate that the proposed algorithms are robust against several geometric changes, such as JPEG compression, rotation, noise, blurring, illumination variations, and scaling. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…Integrating SSA and SVM machine learning algorithms improves decision-making processes, leading to better crop yield through early detection and timely nutrient management. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. …”
    Get full text
    Get full text
    Article
  18. 18

    Robust watermarking using hand gesture for enhanced authentication by Seng, W.C., Fong, L.L., Shing, N.L., Noudeh, S.A.H.

    Published 2011
    “…In this work, a gesture authentication system built with a robust watermark algorithm is presented. This biometric authentication system is divided into two modules, which are watermark embedding module and watermark detection module. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah by Abdullah, Halimah Tun

    Published 2014
    “…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimization of coded signals based on wavelet neural network by Ahmed, Mustafa Sami

    Published 2015
    “…Pulse compression technique is used in many modern radar signal processing systems to achieve the range accuracy and resolution of a narrow pulse while retaining the detection capability of a long pulse. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis