Search Results - (( course evaluation force algorithm ) OR ( between transformational based algorithm ))
Search alternatives:
- transformational based »
- course evaluation »
- evaluation force »
- force algorithm »
-
1
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
Get full text
Get full text
Get full text
Article -
2
Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform
Published 2015“…Performance comparison between SURF and SIFT is made. To obtain matching point between images, Flann Based Matcher is used. …”
Get full text
Get full text
Thesis -
3
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…Memory-based architecture adopted for the all algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
4
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
Published 2016“…The paper introduces a new Haar-based transform algorithm (Haar-Paley-Recursive Transform, HPRT) in the form of a recursive function along with its fast transform version. …”
Get full text
Get full text
Get full text
Article -
5
Contrast enhancement for colour images based on discrete wavelet transform
Published 2017Get full text
Get full text
Student Project -
6
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
Published 2015“…Currently, there is no comparison documented done between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
8
Correlation immunity and resiliency of boolean functions from haar domain perspective
Published 2015“…The results in this presentation are based on a simulation study of the Haar-based algorithm in comparison to its Walsh-counterpart. …”
Get full text
Get full text
Get full text
Article -
9
A Wavelet-Based Particle Swarm Optimization Algorithm for Digital Image Watermarking
Published 2012“…This paper proposes the application of Discrete Wavelet Transform (DWT) into image watermarking by using Particle Swarm Optimization (PSO) which is an evolutionary technique with the stochastic, population-based algorithm for solving this problem. …”
Get full text
Get full text
Get full text
Article -
10
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
11
Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model
Published 2023Conference Paper -
12
Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting
Published 2017“…The hierarchical clustering was used to demonstrate the similarity once the data was divided into training and testing sets. The proposed algorithm is compared with five types of data transformation techniques, namely mean and median in monthly data and the rest is in daily data such as binary, cumulative and actual values.Results indicate that data transformation using X-means data splitting in hierarchical clustering outperformed other transformation techniques and more consistent between training and testing datasets based on similarity measures.…”
Get full text
Get full text
Get full text
Article -
13
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
14
-
15
Fatigue data editing algorithm for automotive applications
Published 2005“…This paper presents a wavelet based algorithm to summa rise a long record of fatigue signal by extracting the bumps (fatigue damaging events) to produce a bump signal. …”
Get full text
Get full text
Article -
16
-
17
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
18
Estimation of transformers health index based on condition parameter factor and hidden Markov model
Published 2018“…Inconsistencies are observed in year 2 and between year 7 and 10 for the predicted HI based on FAF. …”
Get full text
Get full text
Conference or Workshop Item -
19
Penggunaan algoritma genetik bagi menentukur model anjakan mod pengangkutan
Published 2003“…In this study, genetic algorithm is based to calibrate modal shift model from private cars to buses. …”
Get full text
Get full text
Article -
20
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
Published 2016“…The better spectrum sensing algorithm would require some trade-off between probability of detection (PD) and the probability of false alarm (PFA) to obtain good accuracy with low noise variance.…”
Get full text
Get full text
Thesis
