Search Results - (( _ application ((out algorithm) OR (based algorithm)) ) OR ( phone application use algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…This application can be installing into the mobile phone.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Secure annihilation of out-of-band authorization for online transactions by Hussain, Sabahat, Khan, Burhan ul Islam, Anwar, Farhat, Olanrewaju, Rashidah Funke

    Published 2018
    “…Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-time password (OTP) generation mechanism employing two Secure Hash Algorithms viz. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Dermedys: Android-based dermatological diagnostic and analytic expert system by Adamu, Abdul-Hakeem, Akin-Bashiru, Tumilara, Salleh, Norsaremah

    Published 2017
    “…An android application, ‘Dermedys’ with a knowledge base of five erythemato-squamous diseases was developed to implement the algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
    Get full text
    Get full text
    Thesis