Search Results - (( wave visualization system algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…These measurements are read into the computer through the data acquisition system (DAS) card. The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE) by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  12. 12

    A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image by Rayner Pailus, Rayner Alfred

    Published 2020
    “…We have conduct-ed several experiments on mid-wave and long-wave thermal Infrared performance during pre-processing and saw that it is capable to improve recognition beyond what meets the eye. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System by Khosropanah, Pegah

    Published 2011
    “…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
    Get full text
    Get full text
    Thesis
  17. 17

    DEVELOPMENT OF AN OFF-AXIS DIGITAL HOLOGRAPHIC MICROSCOPE FOR THREE-DIMENSIONAL (3D) MICROFLUIDICS APPLICATION by HAWA, RINGKAI

    Published 2019
    “…Digital holographic microscopy (DHM) is a promising three-dimensional fluid flow measurement technique as it can easily measure detailed microscale observation and visualization of flow field in real time. DHM uses digitally recorded hologram and computer algorithm to calculate the image of the object wave front. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…Integration of 3D-GIS and spatial analytical techniques together with hydrologic and hydraulic modeling processes has enhanced the visualization and display techniques for visual presentation and generation of flood inundation maps for early warning and contingency planning.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
    Get full text
    Get full text
    Final Year Project