Search Results - (( surface interpolation using algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    Exponential Parameterized Cubic B-Spline Curves And Surfaces by Ammad, Muhammad

    Published 2020
    “…The use of B-spline interpolation function for curves and surfaces has been developed for many reasons. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Rational Bi-Quartic Spline with Six Parameters for Surface Interpolation with Application in Image Enlargement by Karim, S.A.A.

    Published 2020
    “…A new rational bi-quartic spline interpolation scheme is constructed in this study. This rational bi-quartic spline has six free parameters that can be used to refine the final interpolating surface. …”
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Maintenance dredging: allowable limit for dredge volume differences using SBES and MBES datasets / Raiz Razali by Razali, Raiz

    Published 2017
    “…Dredge volume calculation by various methods using different software, which are surface to datum, surface to surface and cross sections generated from SBES and MBES raw dataset, were compared. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Maintenance derdging: allowable limit for dredge volume differences using SBES and MBES datasets / Raiz Razali by Razali, Raiz

    Published 2017
    “…Dredge volume calculation by various methods using different software, which are surface to datum, surface to surface and cross sections generated from SBES and MBES raw dataset, were compared. …”
    Get full text
    Get full text
    Thesis
  7. 7

    THE DEVELOPMENT OF C1 CUBIC TIMMER TRIANGULAR PATCHES FOR SCATTERED DATA INTERPOLATION by MOHD ALI, FATIN AMANI

    Published 2020
    “…Finally, the cubic Timmer triangular patch is used to reconstruct a surface from non-uniform and uniform scattered data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fast directional search algorithm for fractional pixel motion estimation for H.264 AVC by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun, Yap, Vooi Voon

    Published 2013
    “…To reduce the complexity of fractional pixel ME, unimodal error surface assumption is used to check only some points in the fractional pixel search window. …”
    Get full text
    Get full text
    Citation Index Journal
  17. 17

    GEOGIRA II : Pendekatan ke arah rekabentuk berbantukan komputer by Salleh, Shaharuddin, Rahmat, Hamisan, Sanugi, Bahrom

    Published 1992
    “…The algorithms used are based on the least squares technique, Hermite and cubic spline interpolations.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Algoritma Subbahagian Dalam Cagd by Wan Ramli, Wan Khairiyah Hulaini

    Published 2009
    “…Algoritma de Casteljau menghasilkan lengkung dengan carn menginterpolasi titik kawalan pertama dan titik kawalan terakhir manakala algoritma Chaikin menjana lengkung dengan cara memotong setiap penjuru poligon kawalan asalo Lengkung dan permukaan Bezier kini digunakan secara meluas sebagai asas matematik dalam sistem CAD dan menjadi alat utama dalam perkembangan kaedah-kaedah bam untuk keperluan lengkung dan permukaan dalam CAD, CAGD is the abbreviation for the Computer Aided Geometric Design or in Malay Language, it is called "Rekabentuk Geometri Bantuan Komputer" or RGBKo Generating and controlling curves are important in computer aided designo The techniques for generating the curves and surfaces in CAGD were developed by Paul de Casteljau and Pierre Beziero This project will discuss about 2 subdivision algorithms used in the process of generating curves and surfaces, that are de Casteljau algorithm and Chaikin algorithm.o De Casteljau algorithm generates curves by interpolating the fIrst control point and last control point Chaikin algorithm generates curves by cutting every comer of original control polygono The Bezier curves and surfaces nowadays are established as the mathematical basis of many CAD systems and have fonned a major tool for the development of new methods for curves and surfaces descriptions…”
    Get full text
    Get full text
    Thesis
  19. 19

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…The retrieval of surface reflectance is important to obtain the atmospheric reflectance in remotely sensed data and later used for algorithm calibration. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers