Search Results - (( developing changing conversion algorithm ) OR ( java application during algorithm ))
Search alternatives:
- conversion algorithm »
- developing changing »
- application during »
- java application »
- during algorithm »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
Get full text
Get full text
Monograph -
3
Development of drift conversion algorithm for ISFET based pH sensor for continuous measurement system
Published 2018Get full text
Get full text
Research Report -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm
Published 2013“…For comparison purpose,conventional perturb and observe, and fuzzy logic control algorithms were modelled too. In hardware development, the prototype was developed and tested to verify simulation work. …”
Get full text
Get full text
Thesis -
7
Binary search algorithm as maximum power tracking technique for photovoltaic system under partial shaded conditions
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
8
VOICE MODIFICATION USING DIGITAL TECHNOLOGY
Published 2004“…The project's major activities are to develop programs using MATLAB, that enable speech signal recording, analysis, synthesis, modification, and conversion. …”
Get full text
Get full text
Final Year Project -
9
-
10
-
11
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Then, the proposed MPPT algorithm and dc-dc boost converter were designed and developed in the same tool. …”
Get full text
Get full text
Thesis -
12
Customer profiling using K-means clustering method / Nik Asyraniasna Nik Mohd Asri
Published 2024“…Businesses must understand customer behavior in today's ever-changing business environment in order to properly customize their marketing strategy. …”
Get full text
Get full text
Thesis -
13
Video image processing for traffic analysis
Published 1992“…Double threshold values were applied to the area of interest for the conversion of the area into a binary form. To compensate for the ambient lighting changes, a method of updating threshold values sequentially was introduced. …”
Get full text
Get full text
Get full text
Article -
14
Estimation of [carbon sequestration] on oil palm plantation and its relationship with land surface temperature in Hilir Perak District / Nur Hafizah Jalaluddin
Published 2018“…Oil palm expansion has led to land use conversion in agricultural croplands as it became an issue to the environment. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
Combination of perturb and observe with online sequential extreme learning machine for photovoltaic system maximum power point tracking
Published 2018“…From different MPPT techniques previously proposed, the online sequential extreme learning machine algorithm and conventional perturb and observe are combined together as a proposed MPPT algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
