Search Results - (( phone application new algorithm ) OR ( _ application using algorithm ))*
Search alternatives:
- phone application »
- application new »
- using algorithm »
- new algorithm »
-
1
-
2
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
3
Single channel speech enhancement using Wiener filter and compressive sensing
Published 2017“…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
5
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
Get full text
Get full text
Thesis -
6
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
8
Smart Home Security Using Facial Authentication
Published 2024“…The proposed application allows users to keep track of the happenings at their homes using mobile phones, Tablets, or PCs. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Evaluation of authentication latency using predictive context transfer to support fast handover
Published 2017“…The problem is due to the handover process to a new AP that takes time which may cause interruption to the applications that are in use. …”
Get full text
Get full text
Book -
10
Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping
Published 2014“…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
Get full text
Get full text
Get full text
Article -
11
Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar
Published 2016“…This research is about the application of fuzzy logic algorithm in applying zakat. …”
Get full text
Get full text
Thesis -
12
Qiblah direction: An android application
Published 2023“…The application will use three main Android APIs which are Android.hardware, Android.graphics and Android.view. …”
Article -
13
-
14
-
15
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…Initially, one set of sensor data, features or classifiers were used for activity recognition applications. However, there are new trends on the implementation of fusion strategies to combine sensors data, features and classifiers to provide diversity, offer higher generalization, and tackle challenging issues. …”
Get full text
Get full text
Article -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
Get full text
Get full text
Thesis -
17
-
18
Enhanced notes capture using super resolution technique on tecogan
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Image based authentication using zero-knowledge protocol
Published 2018Get full text
Get full text
Conference or Workshop Item -
20
