Search Results - (( based application use algorithm ) OR ( phone application need algorithm ))
Search alternatives:
- based application »
- phone application »
- application need »
- application use »
- need algorithm »
- use algorithm »
-
1
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
2
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
Get full text
Get full text
Get full text
Article -
4
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
Get full text
Get full text
Thesis -
5
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
6
-
7
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…For example, mobile control can control other device via mobile phone just by using the application such as television, air conditioner, lamp and fan. …”
Get full text
Get full text
Thesis -
8
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
9
Qiblah direction: An android application
Published 2023“…The application will use three main Android APIs which are Android.hardware, Android.graphics and Android.view. …”
Article -
10
P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Development of eCall for Malaysia's automotive industries
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
Get full text
Get full text
Thesis -
15
Content-based indexing of low resolution documents
Published 2016“…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review
Published 2025“…The performance of ML models was deemed impressive, given their simplicity and the datasets used. Key findings highlight the potential future area of research in the empowerment of mobile phone-based MOBA, commercialisation opportunities using ML technology in authentic settings, and overcoming challenges in data access and regional differences.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
19
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
Get full text
Get full text
Thesis -
20
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
Get full text
Get full text
Book Section
