Search Results - (( using codification mining algorithm ) OR ( wave applications interface algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Brain computer interface design and applications: challenges and future by Alwasiti, Haider Hussein, Aris, Ishak, Jantan, Adznan

    Published 2010
    “…Successful Brain Computer Interface (BCI) systems have many potential applications, especially for patients who are paralyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms by Tan, Julie Lee Mei

    Published 2000
    “…The ability to distinguish the usefulness of currently available music synthesis software for the application of various synthesis algorithms is the main focus of the research. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Parallel implementation of complexity reduction approach to fourth order approximation on 2D free space wave propagation. by Hasan, Mohammad Khatim, Othman, Mohamed, Abbas, Zulkifly, Sulaiman, Jumat, Ahmad, Fatimah

    Published 2008
    “…In this paper we solve 2D wave propagation problems on a Symmetrical Multiprocessor machine using message-passing interface. …”
    Get full text
    Get full text
    Article
  8. 8

    Automatic mapping of concrete strength in structural element by Hamid, Roszilah, Mohamed, Ramizi, Mohd. Nayan, Khairul Anuar, Osman, Siti Aminah, Mohd. Yusof, Kamarudin

    Published 2006
    “…The impact generates stress wave, which propagate through the concrete. The accelerometer receives the wave and changes the display from time to frequency domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17