Comparisons of seam carving detection techniques for digital images
Nowadays, there are many mobile devices that come with a lot of sizes. The fast spread of technology allows users to experience using smartphones with different size of visual display screen. The different size of display screen of smartphones also gives a great challenge in resizing the image size...
| Main Authors: | Onn, Nur Amanina, Mohamad, Kamaruddin Malik |
|---|---|
| Other Authors: | Ibrahim, Rosziati |
| Format: | Book Section |
| Language: | English |
| Published: |
Penerbit UTHM
2017
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/4353/ http://eprints.uthm.edu.my/4353/1/Chapter%209_DEISS_S1.pdf |
Similar Items
Comparative analysis of digital artifact persistence between file format
by: Saari, Anati Dalila, et al.
Published: (2017)
by: Saari, Anati Dalila, et al.
Published: (2017)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Comparitive gait analysis for criminal investigation using leave bag behind technique
by: Zainol, Norfazilah, et al.
Published: (2017)
by: Zainol, Norfazilah, et al.
Published: (2017)
Comparative analysis of data wiping technique for android using EXT4 file system
by: Mat Noh, Nurhanisah, et al.
Published: (2017)
by: Mat Noh, Nurhanisah, et al.
Published: (2017)
Comparative analysis of spatio/spectro-temporal data modelling techniques
by: Abdullah, Mohd Hafizul Afifi, et al.
Published: (2017)
by: Abdullah, Mohd Hafizul Afifi, et al.
Published: (2017)
Comparative analysis of firefly algorithm for solving optimization problems
by: Wahid, Fazli, et al.
Published: (2017)
by: Wahid, Fazli, et al.
Published: (2017)
A new hybrid evolutionary algorithm with MCDM for plant forecasting using FIS
by: Nasir, Januardi, et al.
Published: (2017)
by: Nasir, Januardi, et al.
Published: (2017)
Comparative analysis of gamification approaches in education
by: Ahmad Fuadi, Nur Faizura, et al.
Published: (2017)
by: Ahmad Fuadi, Nur Faizura, et al.
Published: (2017)
Performance analysis of SWOT suite toolkit on Inter-domain and Intra-domain Web of Things
by: Anuar, Nur Ameera, et al.
Published: (2017)
by: Anuar, Nur Ameera, et al.
Published: (2017)
1001 resipi: laman web perkongsian resipi
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
Conceptual model of persuasive multimedia content (PMC) for social media advertising of island homestays
by: Muhammad Abdul Malik, Saedon
Published: (2019)
by: Muhammad Abdul Malik, Saedon
Published: (2019)
A Hybridized Model Of Spatial Presense And Guided-Imagery Therapy Technique For Image-Based Virtual Reality In Self-Therapy
by: Mohd Fairuz, Zaiyadi
Published: (2024)
by: Mohd Fairuz, Zaiyadi
Published: (2024)
Backdoor attack detection based on stepping stone detection approach
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014)
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014)
Factors influencing the adoption of digital technology among working millennials
by: Hefvihervina Rohayu, Hariyanto
Published: (2022)
by: Hefvihervina Rohayu, Hariyanto
Published: (2022)
Distributed denial of service detection using stepping stone detection method in internet control message protocol attack
by: Nor Izham, Subri
Published: (2017)
by: Nor Izham, Subri
Published: (2017)
Hybrid features for detection of malicious user in YouTube
by: Sadoon, Omar Hadeb
Published: (2017)
by: Sadoon, Omar Hadeb
Published: (2017)
A study on factors influencing users’ intention to use digital wallet: A case study of Universiti Utara Malaysia (UUM)
by: Baihui, Zhan
Published: (2019)
by: Baihui, Zhan
Published: (2019)
A Combination Between the Employment Service Technique and the Electronic Customer Relationship Management (ECRM)
by: Bany Baker, Mohammad Abdel Qader
Published: (2012)
by: Bany Baker, Mohammad Abdel Qader
Published: (2012)
A study of feature exraction techniques for classifying topics and sentiments from news posts
by: Al-Dyani, Wafa Zubair Abdullah
Published: (2014)
by: Al-Dyani, Wafa Zubair Abdullah
Published: (2014)
Resource allocation technique for powerline network using a modified shuffled frog-leaping algorithm
by: Altrad, Abdallah Mahmoud Mousa
Published: (2018)
by: Altrad, Abdallah Mahmoud Mousa
Published: (2018)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
AGW 616 - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
Kajian Terhadap Proses Penjanaan Pengetahuan Dalam Kaedah - Kaedah Pengajaran Ekspositori Dan Pembelajaran Berasaskan Masalah Berbantukan Sistem Pengurusan Pembelajaran
by: Ahmad, Mazida
Published: (2010)
by: Ahmad, Mazida
Published: (2010)
CSK202 - TEKNOLOGI MAKLUMAT - OKT-NOVEMBER 1992.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
Himpunan Modul TMK Untuk Sekolah Siri 2
by: Abu Ziden, Azidah, et al.
Published: (2016)
by: Abu Ziden, Azidah, et al.
Published: (2016)
Development of industrial training assessment system (iTAS) 2.0: a step forward to educator 4.0
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
Network device ad-blocker
by: Mohamad, Juhaina, et al.
Published: (2020)
by: Mohamad, Juhaina, et al.
Published: (2020)
Poket Musafir: a guide for smart muslim travelers
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
Shooter’s personal performance application
by: Hanip, Muhammad Izzul, et al.
Published: (2020)
by: Hanip, Muhammad Izzul, et al.
Published: (2020)
Titanium dioxide film based photocatalytic application for degradation of dyes
by: Abd Hamed, Noor Kamalia, et al.
Published: (2019)
by: Abd Hamed, Noor Kamalia, et al.
Published: (2019)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
Creating a GUI solver for linear programming models in MATLAB
by: Siaw, Chong Lee, et al.
Published: (2018)
by: Siaw, Chong Lee, et al.
Published: (2018)
Introduction of database concept courseware evaluation using one-group pre-test post-test experimental design
by: Bahrudin, Ida Aryanie, et al.
Published: (2017)
by: Bahrudin, Ida Aryanie, et al.
Published: (2017)
Penggunaan teknologi maklumat dalam pengurusan di Sekolah Menengah Bestari
by: Md Yusoff, Ros Saidatunnaziah
Published: (2004)
by: Md Yusoff, Ros Saidatunnaziah
Published: (2004)
Pengetahuan dan kemahiran teknologi maklumat dan komunikasi di kalangan pensyarah jabatan perdagangan politeknik: satu tinjauan
by: Isnin, Sabrina
Published: (2003)
by: Isnin, Sabrina
Published: (2003)
Pembangunan dan pengujian aktiviti pembelajaran berasaskan MOOC untuk kursus diagnous dan senggaraan audio video
by: Subramaniam, Tamil Selvan, et al.
Published: (2018)
by: Subramaniam, Tamil Selvan, et al.
Published: (2018)
Pembangunan aplikasi mudahalih android “Moneytracker"
by: Nathan, Shelena Soosay, et al.
Published: (2017)
by: Nathan, Shelena Soosay, et al.
Published: (2017)
Pembangunan aplikasi android untuk mempelajari tulisan jawi secara M-learning
by: Mohamed Ali @ Md Hani, Mohd Hatta, et al.
Published: (2017)
by: Mohamed Ali @ Md Hani, Mohd Hatta, et al.
Published: (2017)
Pemantauan keselamatan aset dan kenderaan menggunakan teknologi radio frequency identification (RFID)
by: Omar, Abdul Halim, et al.
Published: (2017)
by: Omar, Abdul Halim, et al.
Published: (2017)
Pembangunan aplikasi sistem penasihat pakar dalam dagangan mata wang GBPUSD menggunakan pergerakan purata eksponen (EMA) dan pengayun stokastik
by: Surip, Miswan, et al.
Published: (2017)
by: Surip, Miswan, et al.
Published: (2017)
Similar Items
-
Comparative analysis of digital artifact persistence between file format
by: Saari, Anati Dalila, et al.
Published: (2017) -
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017) -
Comparitive gait analysis for criminal investigation using leave bag behind technique
by: Zainol, Norfazilah, et al.
Published: (2017) -
Comparative analysis of data wiping technique for android using EXT4 file system
by: Mat Noh, Nurhanisah, et al.
Published: (2017) -
Comparative analysis of spatio/spectro-temporal data modelling techniques
by: Abdullah, Mohd Hafizul Afifi, et al.
Published: (2017)