Search Results - (( process activation conversion algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail by Azilawati Azizan, Azilawati Azizan, NurAine Saidin, NurAine Saidin, Nurkhairizan Khairudin, Nurkhairizan Khairudin, Rohana Ismail, Rohana Ismail

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations by Hossain, S.K.S., Ayodele, B.V., Alhulaybi, Z.A., Alwi, M.M.A.

    Published 2022
    “…One such process used for waste glycerol conversion is the bioprocess, whereby thermophilic microorganisms are utilized. …”
    Get full text
    Get full text
    Article
  5. 5

    Catalytic conversion of methane and carbon dioxide in conventional fixed bed and dielectric barrier discharge plasma reactors by Istadi, Istadi

    Published 2006
    “…The purpose of this study is to develop a new catalytic process for CH4 and CO2 utilization to produce C2 hydrocarbons and/or synthesis gas at high conversion and selectivity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
    Get full text
    Get full text
    Thesis
  8. 8

    VOICE MODIFICATION USING DIGITAL TECHNOLOGY by Nik Mohd Naaim, Nik Najiha Wahida

    Published 2004
    “…The prototype designed performs the conversion process by modulating the frequency of input signal. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini by Zaini, Nurin Qistina

    Published 2023
    “…The system will begin to function by receiving real-time input of a sign language image. The YOLOv7 algorithm will process the image by detecting trained images in the input image. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis by Adnani, Seyedeh Atena

    Published 2011
    “…Subsequent quantitative studies on main effects of parameters governing the reactions based on conversion of fatty acid were conducted by titration analysis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Online mode describes the condition in which the adaptive algorithm is operating in parallel with the transmission process. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A New Model of Securing Iris Authentication Using Steganography by Zainal Abidin, Zaheera, Manaf, Mazani, Shibghatullah, Abdul Samad

    Published 2011
    “…The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Dihydroxystearic acid (DHSA) production by in situ hydrolysis based on optimum process parameters of epoxidized palm oil-derived oleic acid (EPOOA) / Mohd Jumain Jalil by Jalil, Mohd Jumain

    Published 2021
    “…In this model, the method was integrated with genetic algorithm optimization to determine the process model that fit with the experimental data using MATLAB software. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Monitoring land use and urban changes in Kaduna using satellite data by Muhammad Kafi, Kamil, Mohd Shafri, Helmi Zuhaidi

    Published 2015
    “…The utilization of satellite imageries from Landsat 7 ETM+ and Landsat 8 were processed to monitor LULC change that has taken place in Kaduna City from 2001–2014. …”
    Get full text
    Get full text
    Book
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Hear to see glasses / Shameen Qarmila Shahrul Kamal … [et al.] by Shahrul Kamal, Shameen Qarmila, Khairi Anuar, Aiman Danial, Farizal, Muhammad Fikry Arif, Zainoha, Mior Muhamad Fakhri Firdaus

    Published 2024
    “…This proposed optical glass technology innovation addresses the issue of limitation by incorporating natural language processing and computer vision algorithms to accurately transcribe and translate spoken conversations into text or sign language displayed in the user’s line of sight through a wearable AR device. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    Kinetic modelling of hydrogen transfer deoxygenation of a prototypical fatty acid over a bimetallic Pd60Cu40catalyst: An investigation of the surface reaction mechanism and rate li... by Cheah, K.W., Yusup, S., Taylor, M.J., How, B.S., Osatiashtiani, A., Nowakowski, D.J., Bridgwater, A.V., Skoulou, V., Kyriakou, G., Uemura, Y.

    Published 2020
    “…Herein, for the first time, we demonstrate a novel continuous flow process involving the application of tetralin as a hydrogen donor solvent for the catalytic conversion of oleic acid to diesel-like hydrocarbons, using an efficient and stable carbon-supported bimetallic PdCu catalyst. …”
    Get full text
    Get full text
    Article