Search Results - (( developing block detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing block »
- java application »
- block detection »
- using algorithm »
-
1
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis
Published 2017“…The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…Furthermore, the proposed methods are resistant to forgery where small up to 8*8 pixels and flat regions are involved, with little visual structures. The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
7
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Maze Mouse
Published 2004“…The selected sensor is the IR detector that uses the reflective motion in order to detect the mouse position. This kind of sensor is sensitive enough for the project and commonly used for IEEE Micro Mouse Competition .The second block is the microcontroller systems that obtain the input signal from input pins and determine the appropriate algorithm for the output systems. …”
Get full text
Get full text
Final Year Project -
9
Development of novel distance relay scheme to prevent false tripping during power swing
Published 2017“…Moreover, a new adaptive distance protection algorithm is also developed to block the false tripping operation during power swing and unblock the operation if a fault occurs during power swing. …”
Get full text
Get full text
Thesis -
10
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…The first proposal is a method based on the energy preservation theorem to be applied in the H.263 video compression standard to detect frequent All-Zero-AC coefficient blocks. When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. …”
Get full text
Get full text
Thesis -
11
Algoritma Pengekstrakan Imej Cap Jari Berdasarkan Analisa Variasi Arah
Published 2002“…As a result, an extraction algorithm capable of extracting a skeleton structure from a digital 256 gray level fingerprint image was developed. …”
Get full text
Get full text
Get full text
Thesis -
12
Investigation of block matching algorithm for video coding
Published 2013“…The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Wavelet Neural Network based Fault Detection and Diagnosis in an Industrial Gas Turbine
Published 2011Get full text
Conference or Workshop Item -
16
-
17
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Improvement of power swing blocking scheme in distance protection relay
Published 2015“…These two techniques shall provide results that can validate the anticipated improvement in power swing detection over the original algorithm inherent in PSCAD/EMTDC. …”
Get full text
Get full text
Thesis
