Search Results - (( phone application during algorithm ) OR ( its application system algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is “The Chargiszi” where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. The minimum distance for power transfer is 130cm with efficiency of 18.42% with 42.55W (between transmitter and receiver) for ac voltage and 200cm for 5V application (14.7W). …”
    Get full text
    Get full text
    Thesis
  6. 6

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is 'The Chargiszi" where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. The minimum distance for power transfer is 130cm with efficiency of 18.42% with 42.55W (between transmitter and receiver) for ac voltage and 200cm for 5V application (14.7W). …”
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9

    Orthogonal least square algorithm and its application for modelling suspension system by Ahmad, Robiah, Jamaluddin, Hishamuddin

    Published 2001
    “…The derivation of the algorithm is presented and its application to the modelling of a car suspension system is included to demonstrate the effectiveness of the algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    A multi-objective Spiral Dynamic algorithm and its application for PD design by Ahmad Nor Kasruddin, Nasir, Mohd Ashraf, Ahmad, A. R.A., Azwan, Mohd Falfazli, Mat Jusof

    Published 2017
    “…Result presented in this paper shows that MOSDA has a better performance in terms of finding PF and solution spread when tested with benchmark functions compared to NSGAII. In terms of its application in solving a real problem, both algorithms successfully optimize the PD and control the system very well. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system by Ahmad Azwan, Abdul Razak, Ahmad Nor Kasruddin, Nasir, Normaniha, Abd Ghani, Shuhairie, Mohammad, Mohd Falfazli, Mat Jusof, Nurul Amira, Mhd Rizal

    Published 2020
    “…To test the algorithm with a real application, the algorithms were applied to an interval type 2 fuzzy logic controller (IT2FLC) of an inverted pendulum system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    DC motor control using LQR algorithm by Adezeno, Sagoli Olid

    Published 2008
    “…An application in Matlab called Simulink is used as tools for algorithm implementation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article