Search Results - (( phone application during algorithm ) OR ( _ application design algorithms ))*

Refine Results
  1. 1

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    CAPWAP protocol and context transfer to support seamless handover by M. Hasnan, Siti Norhaizum, Ayu, Media Anugerah, Mantoro, Teddy, Mazlan, M. Hasbullah, Abobakr, M., Balfaqih, A., Haseeb, Shariq

    Published 2013
    “…An emerging technology IEEE 802.11 Wireless Local Area Network (WLAN) has brought users to have trendy gadgets like smart phones, tablets and laptops. These applications require a fast and efficient handover that guarantee a service of security and Quality of Service (QoS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5
  6. 6
  7. 7

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is “The Chargiszi” where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is 'The Chargiszi" where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusof, Aiman Yusof, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
    Get full text
    Get full text
    Proceeding
  19. 19
  20. 20