Search Results - (( _ application force algorithm ) OR ( phone application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Genetic case-based reasoning for improved mobile phone faults diagnosis by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Arunkumar, N., Obaid, Omar Ibrahim, A. Mostafa, Salama, Musa Jaber, Mustafa, Burhanuddin, M.A., Mohammed Matar, Bilal, Abdullatif, Saif Khalid, Ahmed Ibrahim, Dheyaa

    Published 2018
    “…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
    Get full text
    Get full text
    Article
  3. 3

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…On the other hand, the proper testing of the application is done to ensure that there is a proper user satisfaction level of the users of the application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…For example, mobile control can control other device via mobile phone just by using the application such as television, air conditioner, lamp and fan. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…The rapid growth of mobile phone technologies encourages many researchers to explore, design and develop mobile learning applications for tertiary students. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…The rapid growth of mobile phone technologies encourages many researchers to explore, design and develop mobile learning applications for tertiary students. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…The developed application is tested on real equipment such as a Nokia N70. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Transparency improvement by external force estimation in a time-delayed nonlinear bilateral teleoperation system by Amini, H., Rezaei, S.M., Sarhan, A.A.D., Akbari, J., Mardi, N.A.

    Published 2015
    “…Experimental results confirm the efficiency of the novel control algorithm in position tracking and force reflection.…”
    Get full text
    Get full text
    Article
  14. 14

    Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network by Ahmad, Puteri Azwa, Mahmuddin, Massudi, Omar, Mohd Hasbullah

    Published 2013
    “…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…The research focuses on the application of an active force control (AFC) strategy with iterative learning control (ILC) algorithms to compensate for the various introduced road profiles or 'disturbances' in a quarter car suspension system as an improvement to ride comfort performance. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Most of the proposed solutions focused only on the Desktop versions of web applications and overlooked the mobile versions. Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
    Get full text
    Get full text
    Get full text
    Article