Search Results - (( based constructive method algorithm ) OR ( mobile information systems algorithm ))*

Refine Results
  1. 1

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…During data collection, empirical model method is used in order to construct the reference table. …”
    Get full text
    Student Project
  2. 2

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hybrid indoor positioning utilizing multipath- assisted fingerprint and geometric estimation for single base station systems by Manap, Zahariah

    Published 2025
    “…The proposed method leverages room geometry and takes advantage of the multipath signal propagation to construct multiple virtual base station system model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Analysis of confidentiality algorithms in different mobile generations by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2017
    “…Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Speaker identification through feature fusion based deep learning / Rashid Jahangir by Rashid , Jahangir

    Published 2021
    “…To address this problem, this study proposes a novel fusion of MFCC and time-based features (MFCCT), which combines the effectiveness of MFCC and time-domain features to improve the accuracy of text-independent speaker identification (SI) systems. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12
  13. 13

    TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS by Teh, Khee Shin

    Published 2020
    “…Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…Furthermore, the mobile robot does not suffer from typical ushape environment by a planned local minimum trapping algorithm and also designed controller is easy to understand, simple, and not sensitive to the system model parameters. …”
    Get full text
    Conference or Workshop Item
  15. 15

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…A proof of concept mobile AR system is implemented as part of this thesis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…In order to increase the mobile communication system capacity without jeopardizing the system QoS, smart antenna is usually being suggested. …”
    Article
  18. 18
  19. 19

    OBJECTS RECOGNITION AND POSE CALCULATION SYSTEM FOR MOBILE AUGMENTED REALITY USING NATURAL FEATURES by Rehman Ullah, Khan, Shahren, Ahmad Zaidi Adruce, Mohd Shahrizal, Sunar, Yahya, Khan, Yasir Hayat, Mughal

    Published 2015
    “…The system extracts natural features by using optimized “Speed up Robust Features” SURF algorithm for mobile architecture. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…This can be proved where the National Security Agency (NSA) in the United States to encrypt confidential data and information. This application will focus more on the user of the Android operating systems based mobile phone users. …”
    Get full text
    Get full text
    Undergraduates Project Papers