Search Results - (( mobile implications _ algorithm ) OR ( wave applications security algorithm ))*
Search alternatives:
-
1
-
2
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As proof of concept, a Top-up printing system is developed and for interaction with the web interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
NFC secured online transaction in mobile computing business
Published 2012“…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
4
Access control and classifier-based blockchain technology in e-healthcare applications
Published 2023Book Chapter -
5
Dual authentication for bluetooth connection
Published 2014Get full text
Get full text
Get full text
Article -
6
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…In conclusion, our system was proven to be a valuable solution for the mobile navigation system. In addition, it is implicated to educate the driver community to be a responsible and alert drivers.…”
Get full text
Get full text
Get full text
Article -
7
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control
Published 1999“…Moreover, two different implication methods (Mamdani minimum and Mamdani Product) implications are used in the interpretation of the IF-THEN rules in the rule-base. …”
Get full text
Get full text
Thesis -
10
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004Get full text
Get full text
Final Year Project -
11
Enhancing smart city mobility using Software Defined Networks
Published 2024“…SDN-based MM can advance sustainable urban development by centralizing control, adapting to changes, optimizing resource allocation, reducing energy consumption, and improving urban mobility. This paper investigates SDN's role in enhancing urban sustainability and analyzes its implications for sustainable cities. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…In the methodology, this study discloses five useful stages. Firstly, mobile phone users' irregular walking behaviour is investigated using a questionnaire to determine their options on mobile usage in the street. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…In the methodology, this study discloses five useful stages. Firstly, mobile phone users' irregular walking behaviour is investigated using a questionnaire to determine their options on mobile usage in the street. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
HandGestureSense: Hand gesture recognition-controlled smart home automation
Published 2024“…The proposal has important implications for people with limited mobility or disabilities, allowing them to easily navigate and manage their living spaces. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
HandGestureSense: Hand gesture recognition-controlled smart home automation
Published 2024“…The proposal has important implications for people with limited mobility or disabilities, allowing them to easily navigate and manage their living spaces. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…Recently, drowsiness detection has garnered significant attention due to its crucial implications in various industries, such as transportation, healthcare, and workplace safety. …”
Get full text
Get full text
Book Section -
18
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…Recently, drowsiness detection has garnered significant attention due to its crucial implications in various industries, such as transportation, healthcare, and workplace safety. …”
Get full text
Get full text
Book Section -
19
A framework for a multi-layered security of an automated programming code assessment tool
Published 2024journal::journal article -
20
Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma
Published 2020“…Solitons can be defined as wave packets that can travel undistorted across long distances even transcontinental and transoceanic. …”
Get full text
Get full text
Get full text
Thesis
