Search Results - (( its application towards algorithm ) OR ( phone application during algorithm ))*
Search alternatives:
- application during »
- towards algorithm »
- phone application »
- during algorithm »
- its application »
-
1
-
2
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
Get full text
Get full text
Thesis -
3
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
-
7
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
8
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
9
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
10
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
11
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Spiral sine-cosine algorithm for global optimization
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
15
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
16
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
17
Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card
Published 2016“…The expansion adds a new gene to our chromosome, which is number of buffers, and its effect towards convergence of fitness values is also a part of our objectives. …”
Get full text
Get full text
Article -
18
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…However, this optimization algorithm can be improved in its strategy which increases its accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
VHDL modeling and simulation of the back-propagation algorithm and its mapping to the RM
Published 1993Get full text
Get full text
Get full text
Proceeding Paper -
20
An algorithm for navigation of mobile robots in cluttered environments
Published 2013Get full text
Get full text
Article
