Search Results - (( based application testing algorithm ) OR ( its applications usage algorithm ))

Refine Results
  1. 1
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  3. 3
  4. 4

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6
  7. 7

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…The accuracy of the DTM was further tested based on in situ experiments and analysed based on RMSE. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
    Get full text
    Get full text
    Article
  10. 10

    Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems by Ary, Maxsi

    Published 2025
    “…The hybridisation mechanism combines the global exploration strength of GWO, the solution refinement capability of SOS, and the effective path construction of ACO into an integrated search strategy. The algorithm was first developed and tested using a standard benchmark dataset (Dantzig42), which was selected due to its standard usage in VRP research and its suitability for performance comparison owing to its structured complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Modelling of assembly line balancing with energy consumption by Ariff Nijay, Ramli, Mohd Fadzil Faisae, Ab Rashid

    Published 2023
    “…The ALB with Energy Consideration (ALB-EC) was modelled into a mathematical model that could be used in solving the Simple Assembly Line Balancing Problem (SALBP), with the application of the Matlab application. The Particle Swarm Optimization (PSO) algorithm was applied and the model was tested by using three problems which consist of each of a small, medium, and large-sized test problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2016
    “…Simulation based on 200 sensor nodes with 1 Joule energy deployed for testing the reliability of MAP. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment by Aqel, Mohammad O. A.

    Published 2016
    “…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design and implementation of solar-powered with IoT-Enabled portable irrigation system by Roshahliza, M. Ramli, Jabbar, Waheb A.

    Published 2022
    “…The system functionality has been practically tested in a real environment, and its performance has been evaluated.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system by Jabbar, Waheb A., Annathurai, Sanmathy, Tajul Ariffin, A. Rahim, M. Fitri, Mohd Fauzi

    Published 2022
    “…Long-range wide-area network (LoRaWAN) has emerged as a key technology for Internet of Things (IoT) applications worldwide owing to its cost-effectiveness, robustness to interference, low power, licensed-free frequency band, and long-range connectivity, thanks to the adaptive data rate. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. In its simplest form, the existence of intra-user variability within handwritten signature samples of an individual is explored using the Kruskal-Wallis hypothesis test. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis