Search Results - (( wave (equalization OR visualization) based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- wave »
-
1
A WAVELET BASED SIGNAL DENOISING AND HYDROCARBON PREDICTION ALGORITHM FOR A NEW MARINE CSEM ANTENNA DESIGN
Published 2017“…This antenna lacks in directivity and focusing of the EM waves. The HED also propagates the EM waves equally in all directions which is a major problem in shallow water with air waves. …”
Get full text
Get full text
Thesis -
2
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
Get full text
Get full text
Thesis -
3
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…The test was conducted using three stimulus repetition rates ( 81.1, 66.1, and 33.3 cps), and the signal averaging was stopped based on ; (i) F test at multiple points equal to 3.1(ii) visual detection (iii) fixed signal average at 2500 sweeps. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
Get full text
Get full text
Thesis -
5
Assessment of cognitive load using multimedia learning and resting states with deep learning perspective
Published 2019“…It is a well-understood fact that the brain activity increases with the increased demand of cognition. The deep learning algorithm based on Pre-trained convolutional neural network (CNN) networks have been used as a transfer learning for the classification of rest and cognitive states and also assessed the cognitive load using brain waves particularly alpha wave. …”
Get full text
Get full text
Conference or Workshop Item -
6
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The monitoring and visualization of tumor cells growth are based on the large scale mathematical simulation. …”
Get full text
Get full text
Get full text
Get full text
Book -
7
-
8
-
9
-
10
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
11
-
12
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Integral-derivative (I-D) and modulation-index-curve prediction control techniques for three-phase AC-DC buck-type converter with simplified voltage-based SPWM /Azrita Alias
Published 2015“…The algorithm of the modulation-index-curve prediction technique is obtained through I-D control model by determining closed-loop dominant poles. …”
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials
Published 2013“…Ultrasonic testing has been a promising NDT which is based on the detection and the interpretation of the ultrasonic waves reflected by defects. …”
Get full text
Get full text
Thesis -
16
-
17
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
