Search Results - (( process using mobile algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- mobile algorithm »
- java application »
-
1
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…In the development phase, the dataset is pre-processed before the modeling process is done using YOLOv8, and deployed on Android platforms using Java and Kotlin languages in Android Studio. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The optimization on ANPR was performed on the pre-processing step using our own Java code as currently there is no image processing library available on the standard Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
8
-
9
Improving the security of mobile IPV6 signalling using KECCAK / SHA-3
Published 2021“…Hence, the signalling process on the Mobile IPv6 is vulnerable. The aim of this paper is to find a hash algorithm that is resistant to both attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Non-probabilistic approach to cooperative position tracking in large swarm of simple mobile robots using triangular cross-observation
Published 2013“…The update process is done using a fixed update gain calculated that will give the best performance for the proposed algorithm, which keeps the complexity of the algorithm to a minimum of 0(1) as compared to 0(N²) of an extended Kalman filter (EKF). …”
Get full text
Get full text
Thesis -
11
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003“…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR
Published 2013“…One of the unique advantages in this project, the detection of human by color only uses image processing that generated by the algorithms itself without additional sensor like sonar or IF sensor.…”
Get full text
Get full text
Article -
13
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
14
Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment
Published 2012“…The sync agent (Multi-agent system) proposed algorithm is based on the use of mobile agents which runs from the host (sender) computer and then migrates to the receiving (receiver) mobile computer to continue the process of updating learning contents before coming back to the sender for completing the process. …”
Get full text
Get full text
Conference or Workshop Item -
15
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
Get full text
Get full text
Article -
16
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
Get full text
Get full text
Thesis -
17
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…Marker-less systems still offer challenges due to increased processing requirements. Some researchers use mobile AR browsers but AR browsers don’t have recognition capability and can only use location data to provide information. …”
Get full text
Get full text
Thesis -
19
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
20
Optimization of ANPR algorithm on android mobile phone
Published 2013“…In this paper, the optimization of ANPR algorithm on limited hardware of Android mobile phone is presented. …”
Get full text
Get full text
Get full text
Proceeding Paper
