Search Results - (( wave application ((means algorithm) OR (max algorithm)) ) OR ( some application use algorithm ))
Search alternatives:
- wave application »
- some application »
- means algorithm »
- application use »
- max algorithm »
- use algorithm »
-
1
-
2
Simulation of undular bores evolution with damping
Published 2017Get full text
Get full text
Article -
3
Simulation of undular bores evolution with damping
Published 2017Get full text
Get full text
Get full text
Article -
4
-
5
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Model verification of all method and model proposed in this study are examined using the simulation study. As illustration, applications are displayed using wind and wave circular data sets.…”
Get full text
Get full text
Thesis -
6
Field theory analysis for wireless infrared system's error correction
Published 2014“…Wireless infrared communications (WIR) is explained as the light waves propagation in free space by means of infrared radiation which exists in 400-700nm.This range corresponds to high frequency range which is useful for higher data rate applications. …”
Get full text
Get full text
Conference or Workshop Item -
7
Seismic input optimisation for Joint Migration Inversion on complex structures, Malay Basin
Published 2017“…Joint Migration Inversion make use of a Closed-Loop imaging process which means that less wave energy is wasted during processing making the final image more consistent with the input data. …”
Get full text
Get full text
Article -
8
Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma
Published 2020“…The spectrum of soliton solutions, that emerge from these algorithms are of bright, dark singular and combo solitons, which depends on the sign of discriminant and these findings are illustrated numerically too. …”
Get full text
Get full text
Get full text
Thesis -
9
Sactive Noise Control Technique Application in Air Conditioning Ducts
Published 2009“…An algorithm, ‘Hardware-Tuned Feedback ANC (HTFA)’, has been developed to implement the ANC technique for the noise reduction application in an air conditioning duct element, where Digital Signal Processing is used to sample noise and produce a complete anti-phase noise produced by the HTFA algorithm. …”
Get full text
Get full text
Thesis -
10
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…Besides insensitive to morphological variations of ECG waves, the computational method is simple and possibly implemented as the basis for future software development for portable device applications.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
13
Development of a State-Space Observer for Active Noise Control Systems
Published 2009Get full text
Get full text
Thesis -
14
Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models
Published 2022“…Seabed logging (SBL) is an application of controlled-source electromagnetic (CSEM) waves to discover marine hydrocarbon-filled reservoirs based on the resistivity contrast of subsurface underneath the seabed. …”
Get full text
Get full text
Article -
15
-
16
-
17
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
18
-
19
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
20
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article
