Search Results - (( wave visualization using algorithm ) OR ( java application mmla algorithm ))
Search alternatives:
- wave visualization »
- java application »
- application mmla »
- using algorithm »
- mmla algorithm »
-
1
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…In this study, it was found that the travel time tomography was less sensitive than the amplitude tomography and frequency tomography in visualizing defect. However, with the use of Q-value as observed data in tomography reconstruction, visualization accuracy has improved substantially. …”
Get full text
Get full text
Thesis -
2
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
3
Development of ultrasonic tomography for composition determination of water and oil flow
Published 2005“…The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
Get full text
Get full text
Thesis -
4
A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images
Published 2010“…Ultimately, a novel scheme for vertical and horizontal interpolation between the corrupted pixels and the non-corrupted adjacent pixels is achieved by improving the efficiency of filling-in. We used a new technique known as the wave-net model. …”
Get full text
Get full text
Article -
5
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…The numerical finite-difference method is chosen as a platform for discretizing the wave equations. The mathematical model of Helmholtz’s model is used to visualize the growth of breast cancer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
9
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
Get full text
Get full text
Get full text
Get full text
Book -
10
A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image
Published 2020“…To create a more robust face recognition with illumination invariant, this paper proposed an algorithm using a triple fusion approach. We are also implementing a hybrid method that combines the active approach by implementing thermal infrared imaging and also the passive approach of Maximum Filter and visual image. …”
Get full text
Get full text
Article -
11
Analysis and simulation of catamaran mini houseboat design by using Computational Fluid Dynamic (CFD) / Muhammad Danish Irfan Mohd Aihsan
Published 2024“…The CFD simulation will be using the software ANSYS to visualize the simulation result. …”
Get full text
Get full text
Student Project -
12
Development of Excel Graphical User Interface (GUI) for tracking amplitude of fault current signals
Published 2017“…This is because Excel VBA is low cost software and widely used. The amplitude of fault current needs some analysis, commonly using DFT measurement algorithms. …”
Get full text
Get full text
Student Project -
13
Simulation of invasive ultrasonic tomography for three phase mixture
Published 2024journal::journal article -
14
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
DEVELOPMENT OF AN OFF-AXIS DIGITAL HOLOGRAPHIC MICROSCOPE FOR THREE-DIMENSIONAL (3D) MICROFLUIDICS APPLICATION
Published 2019“…Digital holographic microscopy (DHM) is a promising three-dimensional fluid flow measurement technique as it can easily measure detailed microscale observation and visualization of flow field in real time. DHM uses digitally recorded hologram and computer algorithm to calculate the image of the object wave front. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System
Published 2011“…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
Get full text
Get full text
Thesis -
17
Detection of the river sediment deposition area at Kuala Perlis river mouth using Landsat 8 OLI within the years 2019, 2020 and 2021 / Nur Zakira Ain Zamrun
Published 2022“…Quantification of Landsat 8 OLI satellite images was applied using ENVI software on the study area for detecting sedimentation in the study area that used image data band correlation in deposited river sediment through unsupervised classifier algorithm and selection of spectral bands for MNDWI. …”
Get full text
Get full text
Thesis -
18
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
19
Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials
Published 2013“…(iii) The image ofthe defect region is reconstructed by using the attenuation of the reflected ultrasound signal (iv) Entropy-based fuzzy k-nearest neighbour classification method is used to extract the feature of the defects. …”
Get full text
Get full text
Thesis -
20
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The land use/cover classes were derived from interpreted information of Landsat TM imagery using the combined object-oriented segmentation - fuzzy logic algorithm. …”
Get full text
Get full text
Thesis
