Search Results - (( phone applications using algorithm ) OR ( based applications model algorithm ))

Refine Results
  1. 1

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  2. 2
  3. 3

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Gait identification using one-vs-one classifier model by Abdul Raziff, Abdul Rafiez, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran

    Published 2016
    “…Lastly, k-NN, MLP and SVM algorithm are compared in determining the best accuracy that works best with the OvO classifier model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of mobile robot controlled by android phone via Bluetooth by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Development of mobile robot controlled by android phone via Bluetooth: article by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
    Get full text
    Get full text
    Article