Search Results - (( _ application need algorithm ) OR ( phone application ((new algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Qiblah direction: An android application by Sameon S.S., Salleh M.S.B.

    Published 2023
    “…The application provides a friendly interface which is easily understandable and does not need much tedious work when finding Qiblah. …”
    Article
  5. 5
  6. 6

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…This project use fuzzy control for the algorithm and Bluetooth for the technique. The developing of the remote buttons in the android application can control the car motion, interfaced by the Bluetooth module. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    The banjir rescue: an IoT-based flood evacuation center system / Nur Aliah Syamsurial by Syamsurial, Nur Aliah

    Published 2020
    “…The system will get the coordinates of the appropriate evacuation center that passes both phases and send the coordinates to the installed navigation applications on the mobile phone such as Google Maps and Waze. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation of authentication latency using predictive context transfer to support fast handover by Mohamad Hasnan, Siti Norhaizum, Muhammed Yusof, Zulkefli

    Published 2017
    “…The problem is due to the handover process to a new AP that takes time which may cause interruption to the applications that are in use. …”
    Get full text
    Get full text
    Book
  19. 19

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is “The Chargiszi” where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. The minimum distance for power transfer is 130cm with efficiency of 18.42% with 42.55W (between transmitter and receiver) for ac voltage and 200cm for 5V application (14.7W). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Smart Home Security Using Facial Authentication by Rakshitha, M.V., Chitra, K.

    Published 2024
    “…The main objective is to improve privacy and security by using facial recognition based on the LBPH technique. The proposed application allows users to keep track of the happenings at their homes using mobile phones, Tablets, or PCs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article