Search Results - (( wave visualization system algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…These measurements are read into the computer through the data acquisition system (DAS) card. The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE) by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  4. 4

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  5. 5

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image by Rayner Pailus, Rayner Alfred

    Published 2020
    “…We have conduct-ed several experiments on mid-wave and long-wave thermal Infrared performance during pre-processing and saw that it is capable to improve recognition beyond what meets the eye. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System by Khosropanah, Pegah

    Published 2011
    “…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
    Get full text
    Get full text
    Thesis
  11. 11

    DEVELOPMENT OF AN OFF-AXIS DIGITAL HOLOGRAPHIC MICROSCOPE FOR THREE-DIMENSIONAL (3D) MICROFLUIDICS APPLICATION by HAWA, RINGKAI

    Published 2019
    “…Digital holographic microscopy (DHM) is a promising three-dimensional fluid flow measurement technique as it can easily measure detailed microscale observation and visualization of flow field in real time. DHM uses digitally recorded hologram and computer algorithm to calculate the image of the object wave front. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…Integration of 3D-GIS and spatial analytical techniques together with hydrologic and hydraulic modeling processes has enhanced the visualization and display techniques for visual presentation and generation of flood inundation maps for early warning and contingency planning.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis