Search Results - (( phone application during algorithm ) OR ( _ application design algorithms ))*
Search alternatives:
- application during »
- application design »
- phone application »
- during algorithm »
-
1
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
Get full text
Get full text
Get full text
Article -
2
-
3
CAPWAP protocol and context transfer to support seamless handover
Published 2013“…An emerging technology IEEE 802.11 Wireless Local Area Network (WLAN) has brought users to have trendy gadgets like smart phones, tablets and laptops. These applications require a fast and efficient handover that guarantee a service of security and Quality of Service (QoS). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
-
6
-
7
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…The name of the device given is “The Chargiszi” where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. …”
Get full text
Get full text
Thesis -
8
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
9
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
10
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
11
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
12
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
13
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…The name of the device given is 'The Chargiszi" where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. …”
Get full text
Get full text
Book Section -
14
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
15
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
16
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
17
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
18
Enhancement Of Aodv Routing Protocol In Masnets
Published 2015“…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
Get full text
Get full text
Proceeding -
19
-
20
