Search Results - (( wave visualization based algorithm ) OR ( java application clustering algorithm ))
Search alternatives:
- application clustering »
- visualization based »
- wave visualization »
- java application »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
Get full text
Get full text
Thesis -
3
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
Get full text
Get full text
Thesis -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
5
-
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The monitoring and visualization of tumor cells growth are based on the large scale mathematical simulation. …”
Get full text
Get full text
Get full text
Get full text
Book -
10
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
-
13
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
Get full text
Get full text
Get full text
Thesis -
15
Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials
Published 2013“…Ultrasonic testing has been a promising NDT which is based on the detection and the interpretation of the ultrasonic waves reflected by defects. …”
Get full text
Get full text
Thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
18
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The system has integrated GIS, RS, DEM, data management capability and a dynamic basin model within a common Windows environment. The simulation algorithms of the rainfall-runoff model have operated on grid bases compatible with the MATLAB programming language, which has been used to write instructions to many grid-based operations. …”
Get full text
Get full text
Thesis -
19
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
Get full text
Get full text
Final Year Project
