Learning and teaching computer programming have been acknowledged as being difficult and challenging. The metacognitive learning environment is needed for learning success in computer Programming problem solving. In d...
详细信息
Content-based retrieval allows finding information by searching its content rather than its attributes. The challenge facing content-based video retrieval (CBVR) is to design systems that can accurately and automatica...
详细信息
We constructed a new fifth order five-stage singly diagonally implicit Runge-Kutta (DIRK) method which is specially designed for the integrations of linear ordinary differential equations (LODEs). The restriction to l...
详细信息
We constructed a new fifth order five-stage singly diagonally implicit Runge-Kutta (DIRK) method which is specially designed for the integrations of linear ordinary differential equations (LODEs). The restriction to linear ordinary differential equations (ODEs) reduces the number of conditions which the coefficients of the Runge-Kutta method must satisfy. The best strategy for practical purposes would be to choose the coefficients of the Runge-Kutta methods such that the error norm is minimized. Thus, here the error norm obtained from the error equations of the sixth order method is minimized so that the free parameters chosen are obtained from the minimized error norm. The stability aspect of the method is also looked into and found to have substantial region of stability, thus it is stable. Then a set of test problems are used to validate the method. Numerical results show that the new method is more efficient in terms of accuracy compared to the existing method.
With the growth of wireless topology during recent decades, routing protocol in Ad-hoc networks has come to the limelight. Routing is defined as a technique of the best route from the source to the destination. VANETs...
详细信息
This work is how to achieve high user throughput with high performance in congested areas by amending the existing coexistence methods and enhancing the performance metrics by updating some input metrics such as duty ...
详细信息
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also ea...
详细信息
ISBN:
(纸本)9781601321190
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information so. In this paper we will overview the use of data hidden techniques in digital images. In particular we will describe on how one can use the human vision system and pure Steganography to increase the she of the data that we want to embed in the image. We will focused on the property of human vision system that help to increase the amount of data hidden in the bitmap (.bmp) image practically, and improve the work by given result and make a brief discussion on this result Quality of Image vs. Quantity of Data hidden in the Image represents a challenge, in fact quality of image and the quantity of data hidden work in reverse side once we try to increase the amount of data hidden the image quality will be effected, in this research paper we will try to study the impact of increase the data hidden on the quality of image, the author test the result with a specialist on the area of image processing as a survey to insure the quality of the image being a subject for suspecting about a fabrications or distortions, in the next stage we will work on the 5 * LSB m a special images or specific areas.
Rice is a producer of basic human needs that have a very important role. Every use of new seeds can cause disease in new plants and often the results obtained are not optimal because they do not know more precisely th...
详细信息
An architecture design of the intelligent agent for speech recognition and translation is presented in this paper. The design involves the agent architecture and the method of the agent is used. The architecture desig...
详细信息
A block cipher should act as a permutation. For a given secret key, two different input plaintext blocks would never result in a collision, i.e. be encrypted to the same ciphertext. This article investigates whether o...
详细信息
Fingerprint classification was introduced to reduce the searching time of fingerprint recognition. There have been many new approaches introduced, mostly in the design of feature extraction. However, no literature to ...
详细信息
暂无评论