Search Results - (( developing block a algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing block »
- java implication »
- a algorithm »
- block a »
-
1
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
2
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…The next stage of algorithm development is the search pattern which is the hexagon diamond (16×16 and 8×8 pixels block size) and full search pattern (4×4 pixels block size). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
6
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
7
New Generalized Algorithm for Developing k-Step Higher Derivative Block Methods for Solving Higher Order Ordinary Differential Equations
Published 2018“…This article presents a new generalized algorithm for developing k-step (m+1) derivative block methods for solving mth order ordinary differential equations. …”
Get full text
Get full text
Get full text
Article -
8
New uniform order eigh hybrid third derivative block method for solving second order initial value problems
Published 2016“…Hence, not only this article presents a new block method that can be adopted when solving real life problems modelled as second order IVPs, it also gives a more convenient algorithm for developing hybrid block methods.…”
Get full text
Get full text
Get full text
Article -
9
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis -
10
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
11
Developing triad design algorithms based on compatible factorization
Published 2011“…These processes have helped us develop algorithm for triad design, the objective of this study.A new technique for triad design algorithm, known as Interval Generation Method was employed to construct TD(6n + 1) and TD(6n + 5).This method depends on analyzing the pattern of triples in the design to build starters.We begin by producing starters from Interval Generation Method as the initial block to begin with.Then the algorithm begins by cycling modular v from the initial block and finishes when the process approaches the initial block.The algorithms for TD(6n+1) and TD(6n+5) are presented in Chapter 4 and 5, respectively.As the entire study depends mainly on TD(v) algorithms, new and remarkable theorems and lemmas for TD(v) development are presented and proved.…”
Get full text
Get full text
Get full text
Monograph -
12
An improved full search block matching algorithm for imaging applications
Published 2012“…Full search block matching algorithm (FSBMA) for motion estimation requires a high level of computations, rendering the technique unsuitable for real-time imaging applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
Get full text
Get full text
Thesis -
14
Approximating Non Linear Higher Order ODEs By A Three Point Block Algorithm
Published 2024journal::journal article -
15
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
17
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…After that, critical performance measurements and metrics used in 3D–CA are identified. The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
18
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The Al-Muqattaat UCE was patent filed in 2007. A block cipher is required as a medium to translate the non - parametric Al-Muqatta’at algorithm into a suite so that it can be an embedded system for FPGA chips. …”
Get full text
Get full text
Proceeding Paper -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. …”
Get full text
Get full text
Get full text
Article
