Search Results - call ((image processing) OR (data processing))
Search alternatives:
- call »
- processing »
-
1
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…The transformation of original data to cipher data is called encryption, while the reverse is called decryption. …”
Get full text
Get full text
Thesis -
2
Automatic vehicle detection system
Published 2007“…This is one of image processing part that called differences. This concept cans different two images and then analysis it using Correlation coefficient concept. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Underwater Image Recognition using Machine Learning
Published 2024“…In the organisation study, image processing supplement the physio-chemical analysis and the sonar detection system. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
Published 2008“…It was discovered that the new system required less processing time to apply filters in pixel level and higher data accuracy with less time complexity to generate training data and monitoring phase. …”
Get full text
Get full text
Thesis -
5
-
6
Homogeneity analysis of particle mixing in a fluidized bed by using colour histogram and artificial neural network analysis / Syaidatul Akma Mohd Zuki
Published 2015“…Because of disadvantages of invasive methods, non-invasive methods such as Digital Image Processing (DIP) have shown great potential in the field of particle mixing and in this study. …”
Get full text
Get full text
Thesis -
7
PDE-based denoising tool for digital radiographic image of welding defect / Tuan Nurul Norazura Tuan Sulong … [et al.]
Published 2014“…The process is called image denoising. Image denoising is the first process in image processing and it is remained as an open problem because each technique has its own limitation such as blurring effect on the whole image and quality reduction, image edges get blurred, unwanted blocking effect and loss of signal information. …”
Get full text
Get full text
Get full text
Book Section -
8
Automated Intelligent real-time system for aggregate classification
Published 2011“…The image capturing system can send high quality images of moving aggregates to the image processing subsystem, and then to the intelligent system for shape classification using artificial neural network. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Filter-based fingerprint feature extraction
Published 2009“…There are two important parts in this project which are image pre-processing and feature extraction. The Gabor filter will be used in the image pre-processing process. …”
Get full text
Get full text
Undergraduates Project Papers -
10
DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain
Published 2014“…Secondly, the non-robustness of embedding algorithm to image processing operation. Therefore in this research, the new model is proposed called StegaSVMShifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images. …”
Get full text
Get full text
Thesis -
11
Automated Guided Vehicle
Published 2006“…If a camera or webcam is used image processing is the data source for the system. …”
Get full text
Get full text
Monograph -
12
Deep learning for scene visualization and sentence-based image synthesis
Published 2023“…Using a public dataset as training data, a deep learning method called CNN used to detect and segment multiple targets in two-dimensional (2D) elemental images for integral imaging system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
Published 2017“…Volatility is used to analyze the captured RAM data and extract suspicious process. This suspicious process is dumped into file and scanned using the Avast antivirus to check whether this process is running Trojan or otherwise. …”
Get full text
Get full text
Get full text
Article -
14
Image based oil palm fruit bunch growth modeling for harvesting operation
Published 2013“…A computer application called Growth Table was developed to manage the FFB digital images and ease the process of grouping the digital images into 25 groups of FFB maturity stages. …”
Get full text
Get full text
Thesis -
15
Specialized imaging and information systems for craniofacial reconstruction
Published 2007“…MyCIS or Malaysian Craniofacial Information System is developed in-house, and consists of three main components: Data input and pre-processing; Database management; Data analysis and manipulation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An improved computational model for classification of 3D spatio temporal FMRI data
Published 2018“…Similarly, Spiking Neural Networks (SNN) has successfully applied in many problems to process and classify fMRI data. However, the network still has a drawback in terms of processing noise, redundant and irrelevant features especially in fMRI data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Comparison study on convolution neural network (CNN) techniques for image classification / Siti Maisarah Zainorzuli ...[et al.]
Published 2022“…Deep Learning is an Artificial Intelligence (AI) function which can imitate the human brain to process data and deciding. It has networks that able to learn the unsupervised data that unlabeled or unstructured. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi
Published 2015“…An intermediate contour called composite contour is generated and inserted between the two adjacent image slices. …”
Get full text
Get full text
Thesis
