Search Results - (( phone application ((a algorithm) OR (new algorithm)) ) OR ( based applications out algorithm ))*

Refine Results
  1. 1
  2. 2

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…Therefore, this project is set out to create a time-saving application for UiTM population in managing their appointment plans in a more accurate and orderly manner. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
    Get full text
    Get full text
    Proceeding
  12. 12
  13. 13
  14. 14

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems by Kazemian, Mohsen

    Published 2016
    “…The first proposed method, called Gray Code-based Phase sequence (GCP) is a new low complexity PAPR reduction scheme based on a Gray code structure and a similarity measurement block; included on two steps: firstly, selecting the phase sequences based on Gray codes and finally, evaluating the similarity between the input and the output of the Power Amplifier (PA), among the selected phase sequences in the previous step. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Smart Home Security Using Facial Authentication by Rakshitha, M.V., Chitra, K.

    Published 2024
    “…If the face is recognized it allows the homeowner access but if the face is not recognized it will sound a warning that there is intrusion. The new face is captured and compared to the existing one and the homeowner then decides where to add the new face for storage.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Evaluation of authentication latency using predictive context transfer to support fast handover by Mohamad Hasnan, Siti Norhaizum, Muhammed Yusof, Zulkefli

    Published 2017
    “…The problem is due to the handover process to a new AP that takes time which may cause interruption to the applications that are in use. …”
    Get full text
    Get full text
    Book
  18. 18
  19. 19
  20. 20