Search Results - (( wave (equalization OR visualization) based algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    A WAVELET BASED SIGNAL DENOISING AND HYDROCARBON PREDICTION ALGORITHM FOR A NEW MARINE CSEM ANTENNA DESIGN by NYAMASVISVA, TADIWA ELISHA

    Published 2017
    “…This antenna lacks in directivity and focusing of the EM waves. The HED also propagates the EM waves equally in all directions which is a major problem in shallow water with air waves. …”
    Get full text
    Get full text
    Thesis
  2. 2

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…The test was conducted using three stimulus repetition rates ( 81.1, 66.1, and 33.3 cps), and the signal averaging was stopped based on ; (i) F test at multiple points equal to 3.1(ii) visual detection (iii) fixed signal average at 2500 sweeps. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Assessment of cognitive load using multimedia learning and resting states with deep learning perspective by Qayyum, A., Faye, I., Malik, A.S., Mazher, M.

    Published 2019
    “…It is a well-understood fact that the brain activity increases with the increased demand of cognition. The deep learning algorithm based on Pre-trained convolutional neural network (CNN) networks have been used as a transfer learning for the classification of rest and cognitive states and also assessed the cognitive load using brain waves particularly alpha wave. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Integral-derivative (I-D) and modulation-index-curve prediction control techniques for three-phase AC-DC buck-type converter with simplified voltage-based SPWM /Azrita Alias by Azrita, Alias

    Published 2015
    “…The algorithm of the modulation-index-curve prediction technique is obtained through I-D control model by determining closed-loop dominant poles. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials by Ng, Sok Choo

    Published 2013
    “…Ultrasonic testing has been a promising NDT which is based on the detection and the interpretation of the ultrasonic waves reflected by defects. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis