Search Results - (( its application based algorithm ) OR ( phone application ((a algorithm) OR (new algorithm)) ))*
Search alternatives:
- application based »
- phone application »
- its application »
- new algorithm »
- a algorithm »
-
1
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
3
Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping
Published 2014“…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
Get full text
Get full text
Get full text
Article -
4
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…The proposed portable ANPR algorithm was implemented and simulated using Android SDK on a computer. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
-
9
Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality
Published 2025“…This study proposes a mobile AR application for indoor navigation that uses an intelligent signage algorithm based on fuzzy logic to estimate arrival time. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
11
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
12
Single channel speech enhancement using Wiener filter and compressive sensing
Published 2017“…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
14
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
Get full text
Get full text
Thesis -
15
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
16
-
17
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Therefore, the objective in this research is to develope a new topology known as superimposed technique in order to overcome the existing problem. …”
Get full text
Get full text
Thesis -
18
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Therefore, the objective in this research is to develope a new topology known as superimposed technique in order to overcome the existing problem. …”
Get full text
Get full text
Book Section -
19
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Smart Home Security Using Facial Authentication
Published 2024“…If the face is recognized it allows the homeowner access but if the face is not recognized it will sound a warning that there is intrusion. The new face is captured and compared to the existing one and the homeowner then decides where to add the new face for storage.…”
Get full text
Get full text
Get full text
Get full text
Article
