Search Results - (( phone application system algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of portable automatic number plate recognition system on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of mobile robot controlled by android phone via Bluetooth by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…An open sourced application called Blue Control is downloaded into the android smart phone to enable the communication between both the android phone and the robot. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Development of mobile robot controlled by android phone via Bluetooth: article by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…An open sourced application called Blue Control is downloaded into the android smart phone to enable the communication between both the android phone and the robot. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…This can be proved where the National Security Agency (NSA) in the United States to encrypt confidential data and information. This application will focus more on the user of the Android operating systems based mobile phone users. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…For example, mobile control can control other device via mobile phone just by using the application such as television, air conditioner, lamp and fan. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Dermedys: Android-based dermatological diagnostic and analytic expert system by Adamu, Abdul-Hakeem, Akin-Bashiru, Tumilara, Salleh, Norsaremah

    Published 2017
    “…In this study, a system implementing a backward chaining algorithm using logical inferences, abduction, deduction, and induction was designed in such a way that it is lightweight enough to run on mobile phones. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Secure annihilation of out-of-band authorization for online transactions by Hussain, Sabahat, Khan, Burhan ul Islam, Anwar, Farhat, Olanrewaju, Rashidah Funke

    Published 2018
    “…A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. …”
    Get full text
    Get full text
    Get full text
    Article