Search Results - (( java application optimisation algorithm ) OR ( data transformation needs algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- transformation needs »
- data transformation »
- java application »
- needs algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
3
Automated time series forecasting
Published 2011“…Good planning and controlling procedure would lead to successful business.There are two categories of forecasting techniques; namely qualitative and quantitative.Qualitative technique is more towards judgmental forecasting and usually used when data is limited. While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
Get full text
Get full text
Get full text
Monograph -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…Algebraic functions are the primitives that strengthen the cryptographic algorithms to ensure confidentiality of data and information. …”
Get full text
Get full text
Article -
6
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
Get full text
Get full text
Thesis -
7
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
8
Thresholding and quantization algorithms for image compression techniques : a review
Published 2018“…Recently, there is a growing interest among researchers focusing on compression of various types of images and data. Amongst various compression algorithms, transform-based compression is one of the promising algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Thresholding and quantization algorithms for image compression techniques: a review
Published 2018“…Recently, there is a growing interest among researchers focusing on compression of various types of images and data. Amongst various compression algorithms, transform-based compression is one of the promising algorithms. …”
Get full text
Get full text
Article -
10
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…The Fast Fourier Transform (FFT) is an efficient method to achieve the Discrete Fourier Transform (DFT) with less number of operations. …”
Get full text
Get full text
Thesis -
11
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
12
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. The data will be embedded into the image digitally and whenever needed will be retrieved out of that image. …”
Get full text
Get full text
Thesis -
13
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
Published 2019“…The cryptosystem is combined with existing Arnold transform in watermarking algorithm to enhance the security of secret image. …”
Get full text
Get full text
Get full text
Article -
14
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…In the process of summarizing data, the data stored in multi-relational database need to be transformed into Term Frequency - Inverse Document Frequency (TF-IDF) vector space. …”
Get full text
Get full text
Get full text
Thesis -
15
A block cipher based on genetic algorithm
Published 2016“…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Get full text
Get full text
Get full text
Thesis -
16
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…The transformation of original data to cipher data is called encryption, while the reverse is called decryption. …”
Get full text
Get full text
Thesis -
17
Median polish techniques for analysing paired data
Published 2017“…Median polish algorithm is useful in removing any noise in the data by computing medians for various coordinates on the data set. …”
Get full text
Get full text
Thesis -
18
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…The frequency domain method of analysis that involves Gardner transformation and conventional inverse filtering often degrades the quality of deconvolved data, leading to inaccurate results, especially for noisy data. …”
Get full text
Get full text
Get full text
Article -
19
Enhancement of medical image compression algorithm in noisy WLANS transmission
Published 2018“…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
Get full text
Get full text
Get full text
Thesis -
20
Time Domain Reflectometry Computational Technique Using Agilent Vee
Published 2007“…Additionally, frequency-to-time measurement option of the VNA has limited capability with only selected transformation algorithm, window and gating method. This motivates the transformation using computer software instead of VNA to transform data, thus, the development of transformation software. …”
Get full text
Get full text
Thesis
