Search Results - (( _ application need algorithm ) OR ( phone application ((new algorithm) OR (based algorithm)) ))
Search alternatives:
- phone application »
- application need »
- need algorithm »
- new algorithm »
-
1
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
Get full text
Get full text
Thesis -
2
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
3
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
4
Qiblah direction: An android application
Published 2023“…The application provides a friendly interface which is easily understandable and does not need much tedious work when finding Qiblah. …”
Article -
5
-
6
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
Get full text
Get full text
Get full text
Article -
8
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
9
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
10
-
11
-
12
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
13
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…This project use fuzzy control for the algorithm and Bluetooth for the technique. The developing of the remote buttons in the android application can control the car motion, interfaced by the Bluetooth module. …”
Get full text
Get full text
Thesis -
15
Content-based indexing of low resolution documents
Published 2016“…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
The banjir rescue: an IoT-based flood evacuation center system / Nur Aliah Syamsurial
Published 2020“…The system will get the coordinates of the appropriate evacuation center that passes both phases and send the coordinates to the installed navigation applications on the mobile phone such as Google Maps and Waze. …”
Get full text
Get full text
Thesis -
17
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
18
Evaluation of authentication latency using predictive context transfer to support fast handover
Published 2017“…The problem is due to the handover process to a new AP that takes time which may cause interruption to the applications that are in use. …”
Get full text
Get full text
Book -
19
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…The name of the device given is “The Chargiszi” where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. The minimum distance for power transfer is 130cm with efficiency of 18.42% with 42.55W (between transmitter and receiver) for ac voltage and 200cm for 5V application (14.7W). …”
Get full text
Get full text
Thesis -
20
Smart Home Security Using Facial Authentication
Published 2024“…The main objective is to improve privacy and security by using facial recognition based on the LBPH technique. The proposed application allows users to keep track of the happenings at their homes using mobile phones, Tablets, or PCs. …”
Get full text
Get full text
Get full text
Get full text
Article
