Search Results - (( wave visualization using algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…In this study, it was found that the travel time tomography was less sensitive than the amplitude tomography and frequency tomography in visualizing defect. However, with the use of Q-value as observed data in tomography reconstruction, visualization accuracy has improved substantially. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images by Al-Azzawi, Alaa Khamees, Saripan, M. Iqbal, Jantan, Adznan, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Ultimately, a novel scheme for vertical and horizontal interpolation between the corrupted pixels and the non-corrupted adjacent pixels is achieved by improving the efficiency of filling-in. We used a new technique known as the wave-net model. …”
    Get full text
    Get full text
    Article
  5. 5

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…The numerical finite-difference method is chosen as a platform for discretizing the wave equations. The mathematical model of Helmholtz’s model is used to visualize the growth of breast cancer. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  9. 9

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE) by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  11. 11

    A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image by Rayner Pailus, Rayner Alfred

    Published 2020
    “…To create a more robust face recognition with illumination invariant, this paper proposed an algorithm using a triple fusion approach. We are also implementing a hybrid method that combines the active approach by implementing thermal infrared imaging and also the passive approach of Maximum Filter and visual image. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Development of Excel Graphical User Interface (GUI) for tracking amplitude of fault current signals by Zainol Abidin, Nursyarina

    Published 2017
    “…This is because Excel VBA is low cost software and widely used. The amplitude of fault current needs some analysis, commonly using DFT measurement algorithms. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15
  16. 16

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18
  19. 19

    DEVELOPMENT OF AN OFF-AXIS DIGITAL HOLOGRAPHIC MICROSCOPE FOR THREE-DIMENSIONAL (3D) MICROFLUIDICS APPLICATION by HAWA, RINGKAI

    Published 2019
    “…Digital holographic microscopy (DHM) is a promising three-dimensional fluid flow measurement technique as it can easily measure detailed microscale observation and visualization of flow field in real time. DHM uses digitally recorded hologram and computer algorithm to calculate the image of the object wave front. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis