Search Results - (( developing block some algorithm ) OR ( java visualisation using algorithm ))
Search alternatives:
- visualisation using »
- java visualisation »
- developing block »
- using algorithm »
- some algorithm »
-
1
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…To diminish the imposed distortion by data embedding in edge blocks, we employ LSB and MPC algorithms. In the proposed scheme, the blocks are split into some groups firstly. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…Five numerical examples are considered and some comparisons are made with the existing methods for demonstrating the validity and reliability of the proposed algorithm.…”
Get full text
Get full text
Get full text
Article -
4
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…Five numerical examples are considered and some comparisons are made with the existing methods for demonstrating the validity and reliability of the proposed algorithm.…”
Get full text
Get full text
Get full text
Article -
5
Parallel block methods for solving higher order ordinary differential equations directly
Published 1999“…A new parallel algorithm for solving systems of ODEs using variable step size and order is also developed. …”
Get full text
Get full text
Thesis -
6
-
7
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…In the field of stereo vision, some of existing stereo matching algorithms are designed with less accuracy of algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…The first proposal is a method based on the energy preservation theorem to be applied in the H.263 video compression standard to detect frequent All-Zero-AC coefficient blocks. When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. …”
Get full text
Get full text
Thesis -
9
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
10
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
Get full text
Get full text
Thesis -
11
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Get full text
Thesis -
12
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Similarly, the key space should be disproportionately large to resist any attack on the secret key. To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Numerical approach for delay volterra integro-differential equation
Published 2022“…Moreover, the studies also carried out on the stability analysis of the proposed method. Some numerical results are tested to validate the competency of the multistep block method with quadrature rule approach.…”
Get full text
Get full text
Get full text
Article -
14
Numerical approach for delay Volterra integro-differential equation
Published 2022“…Moreover, the studies also carried out on the stability analysis of the proposed method. Some numerical results are tested to validate the competency of the multistep block method with quadrature rule approach.…”
Get full text
Get full text
Article -
15
-
16
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
17
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…Then, the conventional DCT block has been replaced with a Wavelet-DCT block. …”
Get full text
Get full text
Final Year Project -
18
-
19
-
20
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…These methods are classified into block-based and key point-based methods. Most prior block based methods rely on exhaustive block matching on image contents and suffer from their inability to localize this type of forgery when the duplicated regions have gone through some geometric transformation operations and post-processing operations. …”
Get full text
Get full text
Thesis
