Search Results - (( wave visualization using algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…In this study, it was found that the travel time tomography was less sensitive than the amplitude tomography and frequency tomography in visualizing defect. However, with the use of Q-value as observed data in tomography reconstruction, visualization accuracy has improved substantially. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images by Al-Azzawi, Alaa Khamees, Saripan, M. Iqbal, Jantan, Adznan, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Ultimately, a novel scheme for vertical and horizontal interpolation between the corrupted pixels and the non-corrupted adjacent pixels is achieved by improving the efficiency of filling-in. We used a new technique known as the wave-net model. …”
    Get full text
    Get full text
    Article
  6. 6

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…The numerical finite-difference method is chosen as a platform for discretizing the wave equations. The mathematical model of Helmholtz’s model is used to visualize the growth of breast cancer. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE) by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image by Rayner Pailus, Rayner Alfred

    Published 2020
    “…To create a more robust face recognition with illumination invariant, this paper proposed an algorithm using a triple fusion approach. We are also implementing a hybrid method that combines the active approach by implementing thermal infrared imaging and also the passive approach of Maximum Filter and visual image. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Development of Excel Graphical User Interface (GUI) for tracking amplitude of fault current signals by Zainol Abidin, Nursyarina

    Published 2017
    “…This is because Excel VBA is low cost software and widely used. The amplitude of fault current needs some analysis, commonly using DFT measurement algorithms. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20