Search Results - (( developing data conversion algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
    Get full text
    Get full text
    Monograph
  6. 6

    An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail by Azilawati Azizan, Azilawati Azizan, NurAine Saidin, NurAine Saidin, Nurkhairizan Khairudin, Nurkhairizan Khairudin, Rohana Ismail, Rohana Ismail

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12
  13. 13

    Embodied conversational agents for H5N1 pandemic crisis by Goh, Ong Sing, Fung, Chun Che, Wong, Kok Wai, Depickere, Arnold

    Published 2007
    “…A Crisis Communication Network, called CCNet, is established based on a novel algorithm incorporating natural language query and embodied conversation agent simultaneously. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Many algorithms for clustering categorical data have been proposed, in which attribute-oriented hierarchical divisive clustering algorithm Min-Min Roughness (MMR) has the highest efficiency among these algorithms with low clustering accuracy, conversely, genetic clustering algorithm Genetic-Average Normalized Mutual Information (G-ANMI) has the highest clustering accuracy among these algorithms with low clustering efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Compensation of frequency independent I/Q imperfections using LMS algorithm by Talebpour, Faraz, Varahram, Pooria, Mohd Ali, Borhanuddin, Sali, Aduwati

    Published 2014
    “…In this paper the effects of IQ imbalance on transmitter is studied and an adaptive algorithm is developed to compensate such distortions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimization of emulsion polymerization of styrene and methyl methacrylate (MMA) by Yok, Loke Kam

    Published 2013
    “…Using gPROMS, the system analyzed the data, created models, developed algorithms, manipulated and plotted based on the functions and data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…Although the performance of the implementation algorithms needs to be further assesed, the preliminary results have demonstrated the success of collecting data for vehicle counts, speeds and headways with reasonable accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  20. 20