Search Results - (( developing nation calling algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application by Tran, D.C., Son Ha, H., Quach, L.-D., Hassan, M.F.

    Published 2020
    “…However, many of the call centers are operated by human manually. Thus, there is need for developing automatic call center which is powered by artificial intelligence (AI), hence reducing operational costs through automation of calls, answering calls, conducting surveys, and receiving customer feedbacks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  4. 4
  5. 5
  6. 6

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…As for Malaysia, it is an advantage if we can develop our own symmetric block cipher for our national security interest. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…As nations develop and prosper economically, their population ages longer and requires extra healthcare. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9
  10. 10

    Detecting emotions and depression through voice by Gunawan, Teddy Surya

    Published 2021
    “…The system, developed by Teddy Surya Gunawan at the International Islamic University Malaysia, could be used by suicide prevention call centres and psychological counsellors. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining by Termedi @ Termiji, Mohammad Izzuan

    Published 2023
    “…Finally, this study can identify academically-at-risk students and develop early intervention.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images by Al-Razzaq Abd, Hayder Abd

    Published 2015
    “…The method, which is called refine and, improves scale-invariant feature transform (RI-SIFT). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
    Get full text
    Get full text
    Thesis