Search Results - (( program visualisation using algorithm ) OR ( wave applications interface algorithm ))

Refine Results
  1. 1

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study by Baharudin, Nurul Atiqah, Ahmad Zaiki, Farah Wahida

    Published 2026
    “…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Brain computer interface design and applications: challenges and future by Alwasiti, Haider Hussein, Aris, Ishak, Jantan, Adznan

    Published 2010
    “…Successful Brain Computer Interface (BCI) systems have many potential applications, especially for patients who are paralyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms by Tan, Julie Lee Mei

    Published 2000
    “…The ability to distinguish the usefulness of currently available music synthesis software for the application of various synthesis algorithms is the main focus of the research. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Parallel implementation of complexity reduction approach to fourth order approximation on 2D free space wave propagation. by Hasan, Mohammad Khatim, Othman, Mohamed, Abbas, Zulkifly, Sulaiman, Jumat, Ahmad, Fatimah

    Published 2008
    “…In this paper we solve 2D wave propagation problems on a Symmetrical Multiprocessor machine using message-passing interface. …”
    Get full text
    Get full text
    Article
  10. 10

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Automatic mapping of concrete strength in structural element by Hamid, Roszilah, Mohamed, Ramizi, Mohd. Nayan, Khairul Anuar, Osman, Siti Aminah, Mohd. Yusof, Kamarudin

    Published 2006
    “…The impact generates stress wave, which propagate through the concrete. The accelerometer receives the wave and changes the display from time to frequency domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
    Get full text
    Get full text
    Thesis
  14. 14

    FBGA-based implementation of electronic abacus using altera DE2 board by Sidek, Azmi

    Published 2017
    “…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20