Search Results - (( its applications means algorithm ) OR ( phone application using algorithm ))*

Refine Results
  1. 1
  2. 2

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of mobile robot controlled by android phone via Bluetooth by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Development of mobile robot controlled by android phone via Bluetooth: article by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Both character segmentation and OCR are using Tesseract library from Google Inc. The proposed portable ANPR algorithm was implemented and simulated using Android SDK on a computer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Both character segmentation and OCR were using Tesseract library from Google Inc. The proposed portable ANPR algorithm was implemented and simulated using Android SDK on a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis