Showing 1 - 20 results of 22 for search '"Haar wavelet', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3

    Numerical solution of nonlinear fredholm and volterra integrals by Newton–Kantorovich and Haar wavelets methods by Mohammad Hasan, Abdul Sathar, Ahmad Fadly Nurullah, Rasedee, Ahmedov, Anvarjon A., Norfifah, Bachok

    Published 2020
    “…The current study proposes a numerical method which solves nonlinear Fredholm and Volterra integral of the second kind using a combination of a Newton–Kantorovich and Haar wavelet. Error analysis for the Holder classes was established to ensure convergence of the Haar wavelets. …”
    Get full text
    Article
  4. 4

    New algorithms for numerical solution of nonlinear integro-differential equations of third order using haar wavelets by Fayyaz , M., Azram, Mohammad

    Published 2013
    “…The approach used in this paper make use of hidden valuable dimensions of Haar wavelets. The proposed method provides strong generic ground, thus yielding solution of both Fredholm and Volterra integro-differential equations of third-order and second kind. …”
    Get full text
    Article
  5. 5

    A numerical solution for nonlinear heat transfer of fin problems using the Haar wavelet quasilinearization method by Mt Aznam, Suazlan, Ghani, Nor Artisham Che, Chowdhury, M.S.H.

    Published 2019
    “…The aim of this paper is to study the new application of Haar wavelet quasilinearization method (HWQM) to solve one-dimensional nonlinear heat transfer of fin problems. …”
    Article
  6. 6

    Efficient Hardware Implementation Of Haar Wavelet Transform With Line-Based And Dual-Scan Image Memory Accesses by Ahmed Saad, Laila

    Published 2017
    “…The main objectives of this thesis are as follows; to implement a 2-D Haar wavelet transform for large gray-scale image, to reduce the number of image memory access by implementing the 2- D Haar wavelet transform with a suitable combination between using external memory and internal memory, and targeting a low-power and high-speed architecture based on multi-levels non-separable discrete Haar wavelet transform. …”
    Get full text
    Thesis
  7. 7

    Impulsive noise mitigation in Haar DWT based OFDM systems by Ali, Moaaz Elhag, Abdullah, Khaizuran, Siddiqi, Mohammad Umar, Ismail, Ahmad Fadzil

    Published 2013
    “…In this work, a simple mitigation technique for the effect of impulsive noise in Haar discrete wavelet transform (DWT) based OFDM systems is presented. …”
    Get full text
    Proceeding Paper
  8. 8

    Performance of fourier-based and wavelet-based OFDM for DVB-T systems by Abdullah, Khaizuran, M. Hussain, Zahir

    Published 2007
    “…For AWGN channel, the gain in term of energy per bit to noise ratio Eb/No was improved by about 5 dB when the system used Haar wavelet compared to FFT-OFDM with a cyclic prefix (CP) of 1/4-th the total OFDM symbol period, for the same BER of 0.001. …”
    Get full text
    Proceeding Paper
  9. 9

    Detection of voltage disturbances in power quality using wavelet transforms by Ramlee, Nor Asrina

    Published 2012
    “…This paper presents the detection of voltage sag and voltage swell event using four types of mother wavelet namely Haar, Dmey, Daubechies and Symlet to identify the most accurate mother. …”
    Get full text
    Thesis
  10. 10

    A wavelet-based approach for vibration analysis of framed structures by Mahdavi, S.H., Abdul Razak, H.

    Published 2013
    “…For this purpose, two different types of wavelet functions have been exemplified including, complex Chebyshev wavelet functions and simple Haar wavelet functions. …”
    Get full text
    Article
  11. 11

    A comparative study on optimal structural dynamics using wavelet functions by Mahdavi, S.H., Razak, H.A.

    Published 2015
    “…The effectiveness of free-scaled Chebyshev wavelet has been compared with simple Haar wavelet and two common integration methods. …”
    Get full text
    Article
  12. 12

    Application of wavelet analysis in tool wear evaluation using image processing method by Lee, Woon Kiow, Tuan Muda, Syed Mohamad Aiman, Ong, Pauline, Sia, Chee Kiong, Talib, Norfazillah, Saleh, Aslinda

    Published 2018
    “…Therefore, the objective of present study is to evaluate the tool wear based on the workpiece profile signature by using wavelet analysis. The effect of wavelet families, scale of wavelet and statistical features of the continuous wavelet coefficient on the tool wear is studied. …”
    Article
  13. 13

    A learning system prediction method using fuzzy regression by Yih, E.W.K., Sainarayanan, G., Sainarayanan, G., Chekima, A., Narendra, G.

    Published 2008
    “…The sequential modified Haar wavelet can maps the integer-valued signals onto integer-valued signals without abandoning the property of perfect reconstruction. …”
    Conference or Workshop Item
  14. 14

    Design of a biometric authentication methodology using palmprint by Wong, Edward Kie Yih

    Published 2009
    “…Five types of palmprint features, namely, Geometric Line features, Discrete Cosine Energy features, Wavelet Energy features, Sequential Haar Energy features and SobelCode features, are extracted from the palmprint image. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development Of Contrast Enhancement Algorithm For Images Captured Under Insufficient Illumination by Huang, Nan

    Published 2017
    “…The proposed algorithm is decomposed by Haar wavelet to obtain the decomposition coefficient in all directions of the image, adjusts the threshold values of wavelet coefficient, then reconstruct the image. …”
    Get full text
    Thesis
  16. 16

    Heat transfer over a steady stretching surface in the presence of suction by Siri, Zailan, Ghani, Nor Artisham Che, Kasmani, Ruhaila Md.

    Published 2018
    “…These equations are then solved numerically by two approaches, Haar wavelet quasilinearization method (HWQM) and Runge–Kutta–Gill method (RK Gill). …”
    Article
  17. 17

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Thesis
  18. 18

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Undergraduates Project Papers
  19. 19

    Efficient online handwritten Chinese character recognition system using a two-dimensional functional relationship model by Chang, Y.F., Lee, J.C., Rijal, O.M., Abu Bakar, S.A.R.S.

    Published 2010
    “…For feature size reduction, the Haar wavelet transformation was applied on the graphs. …”
    Article
  20. 20

    Two dimensional upper human body pose modelling system by Rosalyn R Porle

    Published 2011
    “…The input image sequences, which are acquired from the video, are processed using Single Level Haar Wavelet Transform decomposition. From the decomposition result, three features; namely the silhouette, the edge and the colour are extracted. …”
    Get full text
    Get full text
    Thesis