Search Results - (( phone applications using algorithm ) OR ( based application model algorithm ))
Search alternatives:
- phone applications »
- applications using »
- based application »
- application model »
- using algorithm »
- model algorithm »
-
1
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
2
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
4
Gait identification using one-vs-one classifier model
Published 2016“…Lastly, k-NN, MLP and SVM algorithm are compared in determining the best accuracy that works best with the OvO classifier model. …”
Get full text
Get full text
Conference or Workshop Item -
5
Mobile tour guide application with attraction recognition for UTAR Kampar campus
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
-
8
-
9
Evaluation tool of land suitability for medicinal plants
Published 2019Get full text
Get full text
Get full text
Article -
10
-
11
-
12
-
13
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
Get full text
Get full text
Thesis -
14
Optimization of ANPR algorithm on android mobile phone
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
15
Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review
Published 2025“…The performance of ML models was deemed impressive, given their simplicity and the datasets used. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
-
18
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
Get full text
Get full text
Thesis -
19
Development of mobile robot controlled by android phone via Bluetooth
Published 2015“…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
Get full text
Get full text
Student Project -
20
Development of mobile robot controlled by android phone via Bluetooth: article
Published 2015“…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
Get full text
Get full text
Article
