Search Results - (( based application testing algorithm ) OR ( its applications usage algorithm ))
Search alternatives:
- application testing »
- applications usage »
- based application »
- testing algorithm »
- its applications »
- usage algorithm »
-
1
-
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
3
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
4
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
Get full text
Get full text
Student Project -
5
-
6
Design of a pattern classification system using extreme learning machine
Published 2024text::Final Year Project -
7
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…The accuracy of the DTM was further tested based on in situ experiments and analysed based on RMSE. …”
Get full text
Get full text
Thesis -
8
Design of a pattern classification system using extreme learning machine
Published 2023text::Final Year Project -
9
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
10
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
11
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…The hybridisation mechanism combines the global exploration strength of GWO, the solution refinement capability of SOS, and the effective path construction of ACO into an integrated search strategy. The algorithm was first developed and tested using a standard benchmark dataset (Dantzig42), which was selected due to its standard usage in VRP research and its suitability for performance comparison owing to its structured complexity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Modelling of assembly line balancing with energy consumption
Published 2023“…The ALB with Energy Consideration (ALB-EC) was modelled into a mathematical model that could be used in solving the Simple Assembly Line Balancing Problem (SALBP), with the application of the Matlab application. The Particle Swarm Optimization (PSO) algorithm was applied and the model was tested by using three problems which consist of each of a small, medium, and large-sized test problem. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Simulation based on 200 sensor nodes with 1 Joule energy deployed for testing the reliability of MAP. …”
Get full text
Get full text
Thesis -
14
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
Get full text
Get full text
Thesis -
15
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
Get full text
Get full text
Thesis -
16
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
17
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…The system functionality has been practically tested in a real environment, and its performance has been evaluated.…”
Get full text
Get full text
Get full text
Article -
18
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…Long-range wide-area network (LoRaWAN) has emerged as a key technology for Internet of Things (IoT) applications worldwide owing to its cost-effectiveness, robustness to interference, low power, licensed-free frequency band, and long-range connectivity, thanks to the adaptive data rate. …”
Get full text
Get full text
Get full text
Article -
19
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. In its simplest form, the existence of intra-user variability within handwritten signature samples of an individual is explored using the Kruskal-Wallis hypothesis test. …”
Get full text
Get full text
Get full text
Thesis -
20
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis
