Search Results - (( developing block some algorithm ) OR ( java visualisation using algorithm ))

Refine Results
  1. 1

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…To diminish the imposed distortion by data embedding in edge blocks, we employ LSB and MPC algorithms. In the proposed scheme, the blocks are split into some groups firstly. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Numerical algorithm of block method for general second order ODEs using variable step size by Waeleh, Nazreen, Abdul Majid, Zanariah

    Published 2017
    “…Five numerical examples are considered and some comparisons are made with the existing methods for demonstrating the validity and reliability of the proposed algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Numerical algorithm of block method for general second order ODEs using variable step size by Nazreen Waeleh, Zanariah Abdul Majid

    Published 2017
    “…Five numerical examples are considered and some comparisons are made with the existing methods for demonstrating the validity and reliability of the proposed algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Parallel block methods for solving higher order ordinary differential equations directly by Omar, Zurni

    Published 1999
    “…A new parallel algorithm for solving systems of ODEs using variable step size and order is also developed. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…In the field of stereo vision, some of existing stereo matching algorithms are designed with less accuracy of algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…The first proposal is a method based on the energy preservation theorem to be applied in the H.263 video compression standard to detect frequent All-Zero-AC coefficient blocks. When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Similarly, the key space should be disproportionately large to resist any attack on the secret key. To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Numerical approach for delay volterra integro-differential equation by Nur Auni Baharum, Zanariah Abdul Majid, Norazak Senu, Haliza Rosali

    Published 2022
    “…Moreover, the studies also carried out on the stability analysis of the proposed method. Some numerical results are tested to validate the competency of the multistep block method with quadrature rule approach.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Numerical approach for delay Volterra integro-differential equation by Baharum, Nur Auni, Abdul Majid, Zanariah, Senu, Norazak, Rosali, Haliza

    Published 2022
    “…Moreover, the studies also carried out on the stability analysis of the proposed method. Some numerical results are tested to validate the competency of the multistep block method with quadrature rule approach.…”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by Chai, Beng Seow

    Published 2007
    “…Then, the conventional DCT block has been replaced with a Wavelet-DCT block. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19
  20. 20

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…These methods are classified into block-based and key point-based methods. Most prior block based methods rely on exhaustive block matching on image contents and suffer from their inability to localize this type of forgery when the duplicated regions have gone through some geometric transformation operations and post-processing operations. …”
    Get full text
    Get full text
    Thesis