Search Results - (( wave visualization using algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…In this study, it was found that the travel time tomography was less sensitive than the amplitude tomography and frequency tomography in visualizing defect. However, with the use of Q-value as observed data in tomography reconstruction, visualization accuracy has improved substantially. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images by Al-Azzawi, Alaa Khamees, Saripan, M. Iqbal, Jantan, Adznan, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Ultimately, a novel scheme for vertical and horizontal interpolation between the corrupted pixels and the non-corrupted adjacent pixels is achieved by improving the efficiency of filling-in. We used a new technique known as the wave-net model. …”
    Get full text
    Get full text
    Article
  14. 14

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…The numerical finite-difference method is chosen as a platform for discretizing the wave equations. The mathematical model of Helmholtz’s model is used to visualize the growth of breast cancer. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item