Search Results - (( _ location based algorithm ) OR ( phone application ((a algorithm) OR (new algorithm)) ))

Refine Results
  1. 1

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…One the significance feature of this project is to track the position of device precisely. The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Qiblah direction: An android application by Sameon S.S., Salleh M.S.B.

    Published 2023
    “…This is usually happened when they are moving to a new house or travelling to a foreign place. Several alternatives are available but most application requires internet connection or Global Positioning System (GPS) to operate. …”
    Article
  4. 4

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…In this project, an algorithm will be developed to predict the amount of time needed for the incoming public bus to arrive, based on the current location of the bus and the current time. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality by Mohammed Sohif, Muhammad Hidayat, Mardzuki, Muhammad Imran, Mohd Ibrahim, Azhar, Haja Mohideen, Ahmad Jazlan

    Published 2025
    “…This study proposes a mobile AR application for indoor navigation that uses an intelligent signage algorithm based on fuzzy logic to estimate arrival time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The banjir rescue: an IoT-based flood evacuation center system / Nur Aliah Syamsurial by Syamsurial, Nur Aliah

    Published 2020
    “…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of eCall for Malaysia's automotive industries by Abd Musthalib, Mohd Aliff, Mansor, Hasmah, Zainal Abidin, Zulkifli

    Published 2019
    “…As such, collision detection and voice communication algorithm has been designed. For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Banjir rescue: IOT-based flood evacuation center / Nor Azimah Khalid ... [et al.] by Khalid, Nor Azimah, Syamsurial, Nur aliah, Mohamed Noor, Noorhayati, Abdullah, Shapina

    Published 2025
    “…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
    Get full text
    Get full text
    Article
  16. 16

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain by Amir, Amiza, Muhamad Amin , Anang Hudaya, Khan, Asad I.

    Published 2011
    “…Multi-Wheel Graph Neuron (mWGN) is a single-cycle, light-weight, and scalable associative-memory-based pattern recognition algorithm, and has been implemented over a structured P2P network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Smart Home Security Using Facial Authentication by Rakshitha, M.V., Chitra, K.

    Published 2024
    “…If the face is recognized it allows the homeowner access but if the face is not recognized it will sound a warning that there is intrusion. The new face is captured and compared to the existing one and the homeowner then decides where to add the new face for storage.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Evaluation of authentication latency using predictive context transfer to support fast handover by Mohamad Hasnan, Siti Norhaizum, Muhammed Yusof, Zulkefli

    Published 2017
    “…The problem is due to the handover process to a new AP that takes time which may cause interruption to the applications that are in use. …”
    Get full text
    Get full text
    Book