Search Results - (( wave applications interface algorithm ) OR ( based method pertaining algorithm ))
Search alternatives:
- applications interface »
- pertaining algorithm »
- wave applications »
- based method »
-
1
Real time power quality event detection using continuous wavelet transform
Published 2023Conference paper -
2
Brain computer interface design and applications: challenges and future
Published 2010“…Successful Brain Computer Interface (BCI) systems have many potential applications, especially for patients who are paralyzed. …”
Get full text
Get full text
Get full text
Article -
3
EEG signal classification for real-time brain-computer interface applications: a review
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
4
Development of Graphical User Interface (GUI) for Antenna Design
Published 2016Get full text
Get full text
Final Year Project -
5
Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms
Published 2000“…The ability to distinguish the usefulness of currently available music synthesis software for the application of various synthesis algorithms is the main focus of the research. …”
Get full text
Get full text
Thesis -
6
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023Conference paper -
7
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Parallel implementation of complexity reduction approach to fourth order approximation on 2D free space wave propagation.
Published 2008“…In this paper we solve 2D wave propagation problems on a Symmetrical Multiprocessor machine using message-passing interface. …”
Get full text
Get full text
Article -
9
Automatic mapping of concrete strength in structural element
Published 2006“…The impact generates stress wave, which propagate through the concrete. The accelerometer receives the wave and changes the display from time to frequency domain. …”
Get full text
Get full text
Conference or Workshop Item -
10
Current status, challenges, and possible solutions of EEG-based brain-computer interface: a comprehensive review
Published 2020“…Brain-Computer Interface (BCI), in essence, aims at controlling different assistive devices through the utilization of brain waves. …”
Get full text
Get full text
Get full text
Article -
11
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
12
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…In this study, the proposed DBL and DBLADD algorithm using the Karatsuba method for non-supersingular Koblitz curve over m bits binary field with gcd(2m– 1, 3)=1 that incorporates eight blocks of EN with three temporary variables saved two multiplications or 9.09% in DBL and DBLADD algorithms, in comparison to the recent literature pertaining to EN. …”
Get full text
Get full text
Get full text
Thesis -
13
Chronic kidney disease diagnostic tools based on machine learning algorithms: a review / Muhamad Huzaimi Abdul Ghafar ... [et al.]
Published 2025“…We conducted an extensive literature review, identifying 70 papers pertaining to ML-based CKD diagnostic tools recently published. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
NFC secured online transaction in mobile computing business
Published 2012“…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
17
MOTION TARGET TRACKING OF MOBILE ROBOTS
Published 2015“…The main hardware and has been tested with basic programs based on the algorithms of the said methods. Two-dimensional coordinate measurement and calibration has been achieved with varying degrees of accuracy depending upon the resolution selected for use on the camera. …”
Get full text
Get full text
Final Year Project -
18
-
19
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…When a robust mathematical model of a process equipment is available, model-based diagnostic methods can be used to identify the occurrence of faults in a system. …”
Get full text
Get full text
Article -
20
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Our analysis shows that even with multi-attribute monotone data, non-monotone fuzzy If- Then rules can be produced using an ad hoc method. The same observation can be made, empirically, using a system identification method, e.g., a derivative–based optimization method and the genetic algorithm. …”
Get full text
Get full text
Get full text
Article
