Search Results - (( based applications based algorithm ) OR ( some applications mobile algorithm ))

Refine Results
  1. 1

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm by Kasim Hawari, Mohd Zarifitri

    Published 2023
    “…Hence, a semi-dynamic obstacle with better optimization solutions is crucial to cope with mobile robots in the industry environment. Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…This enables it to meet the MS application requirements based on some criteria such as CINR, BW, and delay. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Industry 4.0 With Intelligent Manufacturing 5G Mobile Robot Based On Genetic Algorithm by Anwar Apandi, Nur Ilyana, Hawari, Mohd Zarifitri Kasim

    Published 2021
    “…This paper proposed a latency network algorithm for the manufacturing 5G mobile robot. An improved genetic algorithm (GA) by restructuring the genes is applied to plan a mobile robot path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Subsequently, local council are also keen to veer towards this adaptation by introducing more technologically based type of services such as parking system using mobile application. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  18. 18

    Storify : Protecting privacy of social media post with hash-based anonymity by Jackie Chin Yong An

    Published 2022
    “…The objectives of this project are to investigate a lightweight hash-based anonymity algorithm in protecting the privacy of social media post, in terms of computation speed and ciphertext size, to design and develop the proposed Storify mobile social media application by using prototype development approach and to evaluate the performance of the developed Storify mobile social media application by using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…However, ICA algorithm is not an easy task for any hardware platform, especially for portable devices, mobiles [17]. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…To solve this problem, a mobile application has been proposed for customers to order their food and drink easily and the owner can manage the order without any restrictions. …”
    Get full text
    Get full text
    Thesis