Search Results - (( developing phone data algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Development of a wearable human fall detection system by Chua, Kean Hong, Sai, Siong Jun, Chan, Chi Yen, Kamsani, Noor Ain, Che Soh, Azura, Raja Ahmad, Raja Mohd Kamil

    Published 2022
    “…This system embraces the Internet of Things (IoT), big data, and data analytics concepts as well as allows data-driven healthcare to be developed.…”
    Get full text
    Get full text
    Article
  2. 2

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…This thesis also proposes an algorithm for pose estimation using homography and investigates the use of static database in smart-phones so as to bypass the need of a desktop server. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat by Mamat, Fatimah

    Published 2012
    “…The sentiment analysis using clonal selection algorithm for twitter’s data system was developed to achieve the main objective which is to classify the twitter’s messages according three sentiments which are positive, negative and neutral. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…System will store all the data inside the database. The main objective of this system is to develop the intelligent algorithm to calculate the exercise needed by the user based on certain criteria. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Securing m-government transmission based on symmetric and asymmetric algorithms: A review by Watari M.A., Zaidan A.A., Zaidan B.B.

    Published 2023
    “…Several changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. …”
    Article
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2018
    “…The energy consumption of cellular networks worldwide has become a major obstacle to the continued future development of mobile data services, considering that the number of mobile phone users worldwide has already surpassed 4 billion and as the near exponential increase of data traffic carried over mobile networks continues, mobile network operators are faced with rapidly increasing energy costs and regulatory pressures to reduce their carbon footprint to operate more “green” networks. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The energy consumption of cellular networks worldwide has become a major obstacle to the continued future development of mobile data services, considering that the number of mobile phone users worldwide has already surpassed 4 billion and as the near exponential increase of data traffic carried over mobile networks continues, mobile network operators are faced with rapidly increasing energy costs and regulatory pressures to reduce their carbon footprint to operate more "green" networks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…To prevent such kinds of deadly scenarios, a reliable fall detection system must be developed to help many lives. In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…This block cipher is suitable to be applied to small devices such as mobile phones and PDAs. The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Data Management System for Local Entrepreneur by SITI NOR ‘IFFAH, NORMIZAN

    Published 2019
    “…In the early 1950s, the first computer programs were developed and focused almost completely on coding algorithms and languages. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis