Search Results - (( _ application designing algorithm ) OR ( phone applications using algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- phone applications »
- applications using »
- using algorithm »
-
1
-
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
3
Development of mobile robot controlled by android phone via Bluetooth
Published 2015“…This robot was designed so that it can be controlled by an android phone instead of using the usual controller, which would be the PS2 controller. …”
Get full text
Get full text
Student Project -
4
Development of mobile robot controlled by android phone via Bluetooth: article
Published 2015“…This robot is designed so that it can be controlled by android phone instead of using the usual controller, which would be the PS2 controller. …”
Get full text
Get full text
Article -
5
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
Get full text
Get full text
Get full text
Article -
7
Dermedys: Android-based dermatological diagnostic and analytic expert system
Published 2017“…In this study, a system implementing a backward chaining algorithm using logical inferences, abduction, deduction, and induction was designed in such a way that it is lightweight enough to run on mobile phones. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
9
SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam
Published 2020“…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
Get full text
Get full text
Thesis -
10
-
11
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
Get full text
Get full text
Thesis -
12
Design and implementation of automatic number plate recognition on android platform
Published 2012“…The proposed ANPR algorithm was implemented and simulated using Android SDK on a computer. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…For example, mobile control can control other device via mobile phone just by using the application such as television, air conditioner, lamp and fan. …”
Get full text
Get full text
Thesis -
14
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…A hybrid cryptographic scheme has been used which combines the NTRU and AES-Rijndael algorithms to achieve more robust functionality. …”
Get full text
Get full text
Get full text
Article -
15
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
16
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
17
Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality
Published 2025“…This study proposes a mobile AR application for indoor navigation that uses an intelligent signage algorithm based on fuzzy logic to estimate arrival time. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…In this paper, we introduce an efficient algorithm for online signature length normalization by using Up-Sampling and Down-Sampling techniques. …”
Get full text
Get full text
Article
