Search Results - (( ((its application) OR (_ application)) mobile algorithm ) OR ( web application use algorithm ))*

Refine Results
  1. 1
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  3. 3

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Nonetheless, users frequently experience poor performance in accessing web sites or downloading files primarily when they use mobile devices due to their limited storage, processing, display, power and communication resources.. …”
    Get full text
    Get full text
    Article
  4. 4

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Virtual room decorator in android by Nurul Ain, Ahmed

    Published 2012
    “…Also provides a simulation mobile platform to test and validate different rover chassis design,its navigation and locomotion algorithms,and the support rover operation for the application built.Besides,the comparison with the various related current systems and applications in the web browser and usability of popular mobile application platforms also issued here.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9

    Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.] by Ahmad, Suzana, Mat Diah, Norizan, Mohamad Kamal, Nor Ashikin, Mohd Jailani, Siti Zalekha

    Published 2009
    “…Djikstra’s algorithm together with Google Maps API and Google Earth, which are popular web mapping services providing geospatial data, have been used to develop, a prototype route planner.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…To solve this problem, a mobile application has been proposed for customers to order their food and drink easily and the owner can manage the order without any restrictions. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    An integration of AHP-ACO technique for social interaction and travel planning by Peh, Perly Thai Ee

    Published 2016
    “…Object Oriented Software Engineering(OOSE) methodology has been used to build the mobile recommender system prototype and web application prototype. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route by Haziq Lim, AM, Wan Sazli, NS, Hussin, B., Azlianor, A. A., Suhaizan, SM, Massila, K

    Published 2010
    “…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20