Search Results - ((data proceeding) OR (data processing)) - digital (techniques. OR technique.)

Search alternatives:

Refine Results
  1. 1

    Comparative data compression techniques and multi-compression results by Ibrahimy, Muhammad Ibn, Motakabber, S. M. A.

    Published 2013
    “…It is a method or system for transmitting a digital image (i.e., an array of pixels) from a digital data source to a digital data receiver. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3
  4. 4

    Towards model checking product lines in the digital humanities: an application to historical data by Breathnach, Ciara, Muhamad Ibrahim, Najhan, Clancy, Stuart, Margaria, Tiziana

    Published 2019
    “…Rapid development in computing techniques and databases’ systems have aided in the digitization of, and access to, various historical (big) data, with significant challenges of analysis and interoperability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    Multilevel Wavelet Decomposition Watermarking Techniques by Wan Adnan, Wan Azinun, Abdul Karim, S., Hitam, Salasiah

    Published 2006
    “…It is a process which embeds some characteristics data in a image in advance which later can be extracted that can be used for authentication or proof of ownership. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    State-of-the-art digital watermarking attacks by Khalifa, Othman Omran, Yusof, Yusnita, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2012
    “…Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. …”
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Circumference determination and data extraction of two-dimensional circle / Siti Sarah Raseli ... [et al.] by Raseli, Siti Sarah, Abdul Ghafar, Nurul Munirah, Mahat, Norpah, Rosaidi, Nor Alifah

    Published 2019
    “…This technique of circumference determination and data extraction can help the researchers for other processes involving the curve fitting and surface fitting in CAGD. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design of digital electricity meter by Al-Khateeb, Khalid A. Saeed

    Published 2010
    “…With a data storage capability and some form of processing, it can provide the consumers with vital information on the trend of their energy consumption. …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Comparative analysis of digital filters for received signal strength indicator by Rosli, Rafhanah Shazwani, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2018
    “…Based on the criteria, the choice of digital signal processing filter can be determined in accordance with its implementations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Depending on what information in which form is hidden in the digital images, one can distinguish two types of data hiding techniques, spatial domain techniques, and frequency domain techniques. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image by Yahya, Saadiah, Hussain, Hanizan Shaker, M., Fakariah Hani

    Published 2015
    “…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Unsupervised learning of image data using generative adversarial network by Rayner Alfred, Lun,, Chew Ye

    Published 2020
    “…Over the past few years, with the introduction of deep learning techniques such as convolution neural network (CNN), supervised learning with CNN had achieved a huge success in the computer vision area such as classifying digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  16. 16
  17. 17

    A novel watermarking technique in data transmission between QR codes and database by Mohamed, Kartini, Sidi, Fatimah, A. Jabar, Marzanah, Ishak, Iskandar

    Published 2013
    “…To confirm the effectiveness of this protection technique, percentage of data loss and processing time for data transmissions are measured. …”
    Get full text
    Conference or Workshop Item
  18. 18

    Assessment of digital camera in mapping meandering flume using close range photogremmetric technique by Udin, W.S., Ahmad, A., Ismail, Z.

    Published 2014
    “…In processing the digital images, digital photogrammetric software was used for processes such as aerial triangulation, stereo compilation, generation of digital elevation model (DEM) and generation of orthophoto. …”
    Get full text
    Non-Indexed Article
  19. 19
  20. 20