Search Results - (( java application optimisation algorithm ) OR ( data transformation needs algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…Good planning and controlling procedure would lead to successful business.There are two categories of forecasting techniques; namely qualitative and quantitative.Qualitative technique is more towards judgmental forecasting and usually used when data is limited. While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation by Hassan Disina, Abdulkadir, Jamel, Sapiee, Abubakar Pindar, Zahraddeen, Mat Deris, Mustafa

    Published 2018
    “…Algebraic functions are the primitives that strengthen the cryptographic algorithms to ensure confidentiality of data and information. …”
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah by Abdullah, Halimah Tun

    Published 2014
    “…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Thresholding and quantization algorithms for image compression techniques : a review by Lashari, Saima Anwar, Rosziati Ibrahim, Nik Shahidah Afifi Md Taujuddin, Norhalina Senan, Suhaila Sari

    Published 2018
    “…Recently, there is a growing interest among researchers focusing on compression of various types of images and data. Amongst various compression algorithms, transform-based compression is one of the promising algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Thresholding and quantization algorithms for image compression techniques: a review by Lashari, Saima Anwar, Ibrahim, Rosziati, Md Taujuddin, Nik Shahidah Afifi, Senan, Norhalina, Sari, Suhaila

    Published 2018
    “…Recently, there is a growing interest among researchers focusing on compression of various types of images and data. Amongst various compression algorithms, transform-based compression is one of the promising algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…The Fast Fourier Transform (FFT) is an efficient method to achieve the Discrete Fourier Transform (DFT) with less number of operations. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. The data will be embedded into the image digitally and whenever needed will be retrieved out of that image. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim by Yazid, Nur Azien, Abdullah, Kamilah, Abd Halim, Suhaila

    Published 2019
    “…The cryptosystem is combined with existing Arnold transform in watermarking algorithm to enhance the security of secret image. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An ensemble data summarization approach based on feature transformation to learning relational data by Chung, Seng Kheau

    Published 2015
    “…In the process of summarizing data, the data stored in multi-relational database need to be transformed into Term Frequency - Inverse Document Frequency (TF-IDF) vector space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…The transformation of original data to cipher data is called encryption, while the reverse is called decryption. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Median polish techniques for analysing paired data by Ajoge, Idris

    Published 2017
    “…Median polish algorithm is useful in removing any noise in the data by computing medians for various coordinates on the data set. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques by Salami, Momoh Jimoh Emiyoka, Sidek, Shahrul Na'im

    Published 2003
    “…The frequency domain method of analysis that involves Gardner transformation and conventional inverse filtering often degrades the quality of deconvolved data, leading to inaccurate results, especially for noisy data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancement of medical image compression algorithm in noisy WLANS transmission by Algaet, Mustafa Almahdi

    Published 2018
    “…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Time Domain Reflectometry Computational Technique Using Agilent Vee by Mohamed Dan, Nur Sharizan

    Published 2007
    “…Additionally, frequency-to-time measurement option of the VNA has limited capability with only selected transformation algorithm, window and gating method. This motivates the transformation using computer software instead of VNA to transform data, thus, the development of transformation software. …”
    Get full text
    Get full text
    Thesis