Search Results - (( phone application during algorithm ) OR ( web application bee algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusof, Aiman Yusof, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Aiman Yusoff, Aiman Yusoff, Noraziahtulhidayu Kamarudin, Noraziahtulhidayu Kamarudin, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Khusairi Sapuan, Khusairi Sapuan

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…Therefore, in order to enhance the performance of AODV in MASNETs, the new routing algorithm based on the estimated distance is proposed to replace the hop count for the selection of next node during the packet transmission. …”
    Get full text
    Get full text
    Proceeding
  18. 18

    CAPWAP protocol and context transfer to support seamless handover by M. Hasnan, Siti Norhaizum, Ayu, Media Anugerah, Mantoro, Teddy, Mazlan, M. Hasbullah, Abobakr, M., Balfaqih, A., Haseeb, Shariq

    Published 2013
    “…An emerging technology IEEE 802.11 Wireless Local Area Network (WLAN) has brought users to have trendy gadgets like smart phones, tablets and laptops. These applications require a fast and efficient handover that guarantee a service of security and Quality of Service (QoS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20