Search Results - call ((image processing) OR (data processing))

Search alternatives:

Refine Results
  1. 1

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…The transformation of original data to cipher data is called encryption, while the reverse is called decryption. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic vehicle detection system by Syahrul Nizam, Zaini

    Published 2007
    “…This is one of image processing part that called differences. This concept cans different two images and then analysis it using Correlation coefficient concept. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Underwater Image Recognition using Machine Learning by Divya, N.K., Manjula, Sanjay Koti, Priyadarshini, S

    Published 2024
    “…In the organisation study, image processing supplement the physio-chemical analysis and the sonar detection system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…It was discovered that the new system required less processing time to apply filters in pixel level and higher data accuracy with less time complexity to generate training data and monitoring phase. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Homogeneity analysis of particle mixing in a fluidized bed by using colour histogram and artificial neural network analysis / Syaidatul Akma Mohd Zuki by Mohd Zuki, Syaidatul Akma

    Published 2015
    “…Because of disadvantages of invasive methods, non-invasive methods such as Digital Image Processing (DIP) have shown great potential in the field of particle mixing and in this study. …”
    Get full text
    Get full text
    Thesis
  7. 7

    PDE-based denoising tool for digital radiographic image of welding defect / Tuan Nurul Norazura Tuan Sulong … [et al.] by Tuan Sulong, Tuan Nurul Norazura, Abd Halim, Suhaila, Ibrahim, Arsmah, HP Manurung, Yupiter

    Published 2014
    “…The process is called image denoising. Image denoising is the first process in image processing and it is remained as an open problem because each technique has its own limitation such as blurring effect on the whole image and quality reduction, image edges get blurred, unwanted blocking effect and loss of signal information. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    Automated Intelligent real-time system for aggregate classification by Md Sani, Zamani

    Published 2011
    “…The image capturing system can send high quality images of moving aggregates to the image processing subsystem, and then to the intelligent system for shape classification using artificial neural network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Filter-based fingerprint feature extraction by Amnani, Ali

    Published 2009
    “…There are two important parts in this project which are image pre-processing and feature extraction. The Gabor filter will be used in the image pre-processing process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain by Shaker Hussain, Hanizan

    Published 2014
    “…Secondly, the non-robustness of embedding algorithm to image processing operation. Therefore in this research, the new model is proposed called StegaSVMShifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automated Guided Vehicle by Ismail, Ahmad Izuan

    Published 2006
    “…If a camera or webcam is used image processing is the data source for the system. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Deep learning for scene visualization and sentence-based image synthesis by Beh, Teck Sian

    Published 2023
    “…Using a public dataset as training data, a deep learning method called CNN used to detect and segment multiple targets in two-dimensional (2D) elemental images for integral imaging system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.] by Hashim, Muhamad Arif, Abd Halim, Iman Hazwam, Ismail, Mohammad Hafiz, Mohd Noor, Norfaizalfarid, Mohd Fuzi, Mohd Faris, Mohammed, Abdul Hapes, JM. Gining, Ray Adderley

    Published 2017
    “…Volatility is used to analyze the captured RAM data and extract suspicious process. This suspicious process is dumped into file and scanned using the Avast antivirus to check whether this process is running Trojan or otherwise. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Image based oil palm fruit bunch growth modeling for harvesting operation by Mohd Kassim, Muhamad Saufi

    Published 2013
    “…A computer application called Growth Table was developed to manage the FFB digital images and ease the process of grouping the digital images into 25 groups of FFB maturity stages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Specialized imaging and information systems for craniofacial reconstruction by Setan, Halim, Majid, Zulkepli, Suwardhi, Deni

    Published 2007
    “…MyCIS or Malaysian Craniofacial Information System is developed in-house, and consists of three main components: Data input and pre-processing; Database management; Data analysis and manipulation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image by Yahya, Saadiah, Hussain, Hanizan Shaker, M., Fakariah Hani

    Published 2015
    “…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An improved computational model for classification of 3D spatio temporal FMRI data by Saharuddin, Shaznoor Shakira

    Published 2018
    “…Similarly, Spiking Neural Networks (SNN) has successfully applied in many problems to process and classify fMRI data. However, the network still has a drawback in terms of processing noise, redundant and irrelevant features especially in fMRI data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Comparison study on convolution neural network (CNN) techniques for image classification / Siti Maisarah Zainorzuli ...[et al.] by Zainorzuli, Siti Maisarah, Che Abdullah, Syahrul Afzal, Abidin, Husna Zainol, Ahmat Ruslan, Fazlina

    Published 2022
    “…Deep Learning is an Artificial Intelligence (AI) function which can imitate the human brain to process data and deciding. It has networks that able to learn the unsupervised data that unlabeled or unstructured. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi by Abdul Hadi, Normi

    Published 2015
    “…An intermediate contour called composite contour is generated and inserted between the two adjacent image slices. …”
    Get full text
    Get full text
    Thesis