Search Results - (( phone application during algorithm ) OR ( based application use algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusof, Aiman Yusof, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
    Get full text
    Get full text
    Proceeding