Search Results - (( course evaluation force algorithm ) OR ( between transformational based algorithm ))

Refine Results
  1. 1

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Performance comparison between SURF and SIFT is made. To obtain matching point between images, Flann Based Matcher is used. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2016
    “…The paper introduces a new Haar-based transform algorithm (Haar-Paley-Recursive Transform, HPRT) in the form of a recursive function along with its fast transform version. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks by Said, Mohamed Abdisalan

    Published 2015
    “…Currently, there is no comparison documented done between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Correlation immunity and resiliency of boolean functions from haar domain perspective by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2015
    “…The results in this presentation are based on a simulation study of the Haar-based algorithm in comparison to its Walsh-counterpart. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A Wavelet-Based Particle Swarm Optimization Algorithm for Digital Image Watermarking by Jasni, Mohamad Zain, Tao, Hai, Ahmed, M. Masroor, Abdalla, Ahmed N., Jing, Wang

    Published 2012
    “…This paper proposes the application of Discrete Wavelet Transform (DWT) into image watermarking by using Particle Swarm Optimization (PSO) which is an evolutionary technique with the stochastic, population-based algorithm for solving this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…The hierarchical clustering was used to demonstrate the similarity once the data was divided into training and testing sets. The proposed algorithm is compared with five types of data transformation techniques, namely mean and median in monthly data and the rest is in daily data such as binary, cumulative and actual values.Results indicate that data transformation using X-means data splitting in hierarchical clustering outperformed other transformation techniques and more consistent between training and testing datasets based on similarity measures.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fatigue data editing algorithm for automotive applications by Shahrum Abdullah, John R. Yates, Joseph A. Giacornin

    Published 2005
    “…This paper presents a wavelet based algorithm to summa rise a long record of fatigue signal by extracting the bumps (fatigue damaging events) to produce a bump signal. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Penggunaan algoritma genetik bagi menentukur model anjakan mod pengangkutan by Siti Hajar, Riza Atiq, Amiruddin Ismail, Hassan Basri

    Published 2003
    “…In this study, genetic algorithm is based to calibrate modal shift model from private cars to buses. …”
    Get full text
    Get full text
    Article
  20. 20

    A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing by Barakat, Hussein Mohammed

    Published 2016
    “…The better spectrum sensing algorithm would require some trade-off between probability of detection (PD) and the probability of false alarm (PFA) to obtain good accuracy with low noise variance.…”
    Get full text
    Get full text
    Thesis