Search Results - (( phone application during algorithm ) OR ( based application ria algorithm ))*

Refine Results
  1. 1
  2. 2

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Application of artificial intelligence (AI) in islamic investments by Haneffa Muchlis Gazali, Junisa Jumadi, Noor Rasyidah Ramlan, Nurmaisarah Abd Rahmat, Siti Nor Hazilawati Mohd Uzair, Amirah Norliyana Mohid

    Published 2020
    “…The technology helps investors to analyse their stocks in terms of price levels, the current stability of each stock and the future price forecasts based on current price and stock data. The study is a conceptual discussion on the application of AI in Islamic investment, which focuses on the discussion of Text Mining, Algorithmic Trading, Stock Pick and Robo in Investment, which include Robo Advisor, Robo Islamic Advisor (RIA) and Robo Financial Advisor (RFA) operating in Islamic investment system. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusof, Aiman Yusof, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
    Get full text
    Get full text
    Proceeding
  16. 16

    CAPWAP protocol and context transfer to support seamless handover by M. Hasnan, Siti Norhaizum, Ayu, Media Anugerah, Mantoro, Teddy, Mazlan, M. Hasbullah, Abobakr, M., Balfaqih, A., Haseeb, Shariq

    Published 2013
    “…An emerging technology IEEE 802.11 Wireless Local Area Network (WLAN) has brought users to have trendy gadgets like smart phones, tablets and laptops. These applications require a fast and efficient handover that guarantee a service of security and Quality of Service (QoS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18
  19. 19

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
    Get full text
    Get full text
    Thesis
  20. 20