Search Results - (( based applications based algorithm ) OR ( phone application use algorithm ))
Search alternatives:
- based applications »
- applications based »
- phone application »
- application use »
- use algorithm »
-
1
Optimization of ANPR algorithm on android mobile phone
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
-
4
-
5
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
Get full text
Get full text
Thesis -
6
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
7
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
8
-
9
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
10
Dermedys: Android-based dermatological diagnostic and analytic expert system
Published 2017“…An android application, ‘Dermedys’ with a knowledge base of five erythemato-squamous diseases was developed to implement the algorithm.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
13
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
Get full text
Get full text
Get full text
Article -
15
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
16
Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality
Published 2025“…This study proposes a mobile AR application for indoor navigation that uses an intelligent signage algorithm based on fuzzy logic to estimate arrival time. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
Get full text
Get full text
Thesis -
18
Android malware detection using permission based static analysis
Published 2023“…Android security is related to the permissions allowed by users to the applications. There have been many studies on permission-based Android malware detection. …”
Get full text
Get full text
Article -
19
Android malware detection using permission based static analysis
Published 2024“…Android is a mobile operating system that is the most used on smart mobile phones. Because it is the most used and open source, it has been the target of attackers. …”
Get full text
Get full text
Article -
20
