Search Results - (( surface interpolation using algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    Exponential Parameterized Cubic B-Spline Curves And Surfaces by Ammad, Muhammad

    Published 2020
    “…The use of B-spline interpolation function for curves and surfaces has been developed for many reasons. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Rational Bi-Quartic Spline with Six Parameters for Surface Interpolation with Application in Image Enlargement by Karim, S.A.A.

    Published 2020
    “…A new rational bi-quartic spline interpolation scheme is constructed in this study. This rational bi-quartic spline has six free parameters that can be used to refine the final interpolating surface. …”
    Get full text
    Get full text
    Article
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Maintenance dredging: allowable limit for dredge volume differences using SBES and MBES datasets / Raiz Razali by Razali, Raiz

    Published 2017
    “…Dredge volume calculation by various methods using different software, which are surface to datum, surface to surface and cross sections generated from SBES and MBES raw dataset, were compared. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Maintenance derdging: allowable limit for dredge volume differences using SBES and MBES datasets / Raiz Razali by Razali, Raiz

    Published 2017
    “…Dredge volume calculation by various methods using different software, which are surface to datum, surface to surface and cross sections generated from SBES and MBES raw dataset, were compared. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  9. 9

    THE DEVELOPMENT OF C1 CUBIC TIMMER TRIANGULAR PATCHES FOR SCATTERED DATA INTERPOLATION by MOHD ALI, FATIN AMANI

    Published 2020
    “…Finally, the cubic Timmer triangular patch is used to reconstruct a surface from non-uniform and uniform scattered data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  13. 13

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Fast directional search algorithm for fractional pixel motion estimation for H.264 AVC by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun, Yap, Vooi Voon

    Published 2013
    “…To reduce the complexity of fractional pixel ME, unimodal error surface assumption is used to check only some points in the fractional pixel search window. …”
    Get full text
    Get full text
    Citation Index Journal
  15. 15

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    GEOGIRA II : Pendekatan ke arah rekabentuk berbantukan komputer by Salleh, Shaharuddin, Rahmat, Hamisan, Sanugi, Bahrom

    Published 1992
    “…The algorithms used are based on the least squares technique, Hermite and cubic spline interpolations.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Algoritma Subbahagian Dalam Cagd by Wan Ramli, Wan Khairiyah Hulaini

    Published 2009
    “…Algoritma de Casteljau menghasilkan lengkung dengan carn menginterpolasi titik kawalan pertama dan titik kawalan terakhir manakala algoritma Chaikin menjana lengkung dengan cara memotong setiap penjuru poligon kawalan asalo Lengkung dan permukaan Bezier kini digunakan secara meluas sebagai asas matematik dalam sistem CAD dan menjadi alat utama dalam perkembangan kaedah-kaedah bam untuk keperluan lengkung dan permukaan dalam CAD, CAGD is the abbreviation for the Computer Aided Geometric Design or in Malay Language, it is called "Rekabentuk Geometri Bantuan Komputer" or RGBKo Generating and controlling curves are important in computer aided designo The techniques for generating the curves and surfaces in CAGD were developed by Paul de Casteljau and Pierre Beziero This project will discuss about 2 subdivision algorithms used in the process of generating curves and surfaces, that are de Casteljau algorithm and Chaikin algorithm.o De Casteljau algorithm generates curves by interpolating the fIrst control point and last control point Chaikin algorithm generates curves by cutting every comer of original control polygono The Bezier curves and surfaces nowadays are established as the mathematical basis of many CAD systems and have fonned a major tool for the development of new methods for curves and surfaces descriptions…”
    Get full text
    Get full text
    Thesis
  19. 19

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…The retrieval of surface reflectance is important to obtain the atmospheric reflectance in remotely sensed data and later used for algorithm calibration. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient visualization of scattered energy distribution data by using cubic timmer triangular patches by Ali, F.A.M., Karim, S.A.A., Dass, S.C., Skala, V., Hasan, M.K., Hashim, I.

    Published 2019
    “…In order to apply the cubic Timmer triangular patches for scattered data interpolation, the data is first triangulated by using the Delaunay algorithm, and then the sufficient condition for C1 continuity is derived along the adjacent triangles. …”
    Get full text
    Get full text
    Book