Search Results - (( developing developing block algorithm ) OR ( java implementation search algorithm ))
Search alternatives:
- developing developing »
- implementation search »
- java implementation »
- developing block »
- block algorithm »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…The next stage of algorithm development is the search pattern which is the hexagon diamond (16×16 and 8×8 pixels block size) and full search pattern (4×4 pixels block size). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
7
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
8
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
9
New Generalized Algorithm for Developing k-Step Higher Derivative Block Methods for Solving Higher Order Ordinary Differential Equations
Published 2018“…This article presents a new generalized algorithm for developing k-step (m+1) derivative block methods for solving mth order ordinary differential equations. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Developing triad design algorithms based on compatible factorization
Published 2011“…These processes have helped us develop algorithm for triad design, the objective of this study.A new technique for triad design algorithm, known as Interval Generation Method was employed to construct TD(6n + 1) and TD(6n + 5).This method depends on analyzing the pattern of triples in the design to build starters.We begin by producing starters from Interval Generation Method as the initial block to begin with.Then the algorithm begins by cycling modular v from the initial block and finishes when the process approaches the initial block.The algorithms for TD(6n+1) and TD(6n+5) are presented in Chapter 4 and 5, respectively.As the entire study depends mainly on TD(v) algorithms, new and remarkable theorems and lemmas for TD(v) development are presented and proved.…”
Get full text
Get full text
Get full text
Monograph -
12
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Get full text
Thesis -
13
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
New uniform order eigh hybrid third derivative block method for solving second order initial value problems
Published 2016“…The methodology employed involves a new generalized algorithm for developing the hybrid block method which is another novel contribution existing in this work. …”
Get full text
Get full text
Get full text
Article -
15
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
Get full text
Get full text
Thesis -
16
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
17
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
18
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…This thesis will present the design, development and analysis of performance on a developed Double Stage Filter (DSF) algorithm and other existing stereo matching algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis
