Search Results - (( _ application a algorithm ) OR ( phone application during algorithm ))
Search alternatives:
- application during »
- phone application »
- during algorithm »
- application a »
- a algorithm »
-
1
-
2
-
3
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…The developed application is tested on real equipment such as a Nokia N70. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
6
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
7
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
8
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
9
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
10
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
11
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
12
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
13
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
14
-
15
CAPWAP protocol and context transfer to support seamless handover
Published 2013“…An emerging technology IEEE 802.11 Wireless Local Area Network (WLAN) has brought users to have trendy gadgets like smart phones, tablets and laptops. These applications require a fast and efficient handover that guarantee a service of security and Quality of Service (QoS). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Content-based indexing of low resolution documents
Published 2016“…We develop CBIR system and conduct various retrieval experiments with the fundamental aim of comparing the accuracy during image retrieval. A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Knowledge Discovery Of Noise Level In Lecture Rooms
Published 2018Get full text
Get full text
Monograph -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Imagine that a notice with a logo of Mobile Phone company is received by an email informing that the customer had recently run up a large mobile phone bill. …”
Get full text
Get full text
Thesis -
20
Enhancement Of Aodv Routing Protocol In Masnets
Published 2015“…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
Get full text
Get full text
Proceeding
