Search Results - (( data implication window algorithm ) OR ( media applications modified algorithm ))
Search alternatives:
- applications modified »
- media applications »
- data implication »
- window algorithm »
-
1
An efficient unknown detection approach for RFID data stream management system
Published 2025“…The materials and methods employed include comprehensive simulations and real-world RFID data streams to validate the algorithm's effectiveness. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Embedded Ethernet System For Real-Time Communication
Published 2018Get full text
Get full text
Monograph -
4
Review of the grey wolf optimization algorithm: variants and applications
Published 2023Get full text
Get full text
Article -
5
-
6
-
7
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…In this work, the recovery elements of the modified LSB and AES algorithms were examined to conduct testing.…”
Get full text
Get full text
Get full text
Article -
8
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
Published 2013“…The quality of the watermarked images is considered as one of the most important requirements of any watermarking system.In most applications, the watermarking algorithm embeds the watermark without affecting the quality of the host media.In this study, a comparison of watermarking image quality was performed between two existing methods: Dual Intermediate Significant Bit (DISB) an d Genetic Algorithm (GA).The first method focuses on the high quality of the watermarked image based on DISB model and this method requires embedding two bits into every pixel of the original image, while the other six bits are modified so as to immediately assimilate the original pixel. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Thesis -
10
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
14
Fuzzy logic controller optimized by MABSA for DC servo motor on physical experiment
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis -
16
