Search Results - (( phone application during algorithm ) OR ( based application use algorithm ))*
Search alternatives:
- application during »
- phone application »
- based application »
- during algorithm »
- application use »
- use algorithm »
-
1
-
2
-
3
Content-based indexing of low resolution documents
Published 2016“…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
Get full text
Get full text
Thesis -
6
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
Get full text
Get full text
Thesis -
9
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
Get full text
Get full text
Book Section -
10
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
11
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
12
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
13
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
14
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
15
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
16
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
17
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
18
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development
Published 2023“…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
Get full text
Get full text
Get full text
Article -
20
Enhancement Of Aodv Routing Protocol In Masnets
Published 2015“…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
Get full text
Get full text
Proceeding
