Search Results - (( developing changing conversion algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm by Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2013
    “…For comparison purpose,conventional perturb and observe, and fuzzy logic control algorithms were modelled too. In hardware development, the prototype was developed and tested to verify simulation work. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    VOICE MODIFICATION USING DIGITAL TECHNOLOGY by Nik Mohd Naaim, Nik Najiha Wahida

    Published 2004
    “…The project's major activities are to develop programs using MATLAB, that enable speech signal recording, analysis, synthesis, modification, and conversion. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Then, the proposed MPPT algorithm and dc-dc boost converter were designed and developed in the same tool. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Customer profiling using K-means clustering method / Nik Asyraniasna Nik Mohd Asri by Nik Mohd Asri, Nik Asyraniasna

    Published 2024
    “…Businesses must understand customer behavior in today's ever-changing business environment in order to properly customize their marketing strategy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…Double threshold values were applied to the area of interest for the conversion of the area into a binary form. To compensate for the ambient lighting changes, a method of updating threshold values sequentially was introduced. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Estimation of [carbon sequestration] on oil palm plantation and its relationship with land surface temperature in Hilir Perak District / Nur Hafizah Jalaluddin by Jalaluddin, Nur Hafizah

    Published 2018
    “…Oil palm expansion has led to land use conversion in agricultural croplands as it became an issue to the environment. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Combination of perturb and observe with online sequential extreme learning machine for photovoltaic system maximum power point tracking by Dira, Yasir Sabah

    Published 2018
    “…From different MPPT techniques previously proposed, the online sequential extreme learning machine algorithm and conventional perturb and observe are combined together as a proposed MPPT algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis