Search Results - (( its application mobile algorithm ) OR ( web application use algorithm ))*

Refine Results
  1. 1
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  3. 3

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  4. 4
  5. 5

    Virtual room decorator in android by Nurul Ain, Ahmed

    Published 2012
    “…Also provides a simulation mobile platform to test and validate different rover chassis design,its navigation and locomotion algorithms,and the support rover operation for the application built.Besides,the comparison with the various related current systems and applications in the web browser and usability of popular mobile application platforms also issued here.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of mobile application of event assistant and booking sport facilities for UiTM Seremban 3 Campus using wofkflow management system / Ahmad Haiqal Abd Halim, Ahmad Yusuf... by Abd Halim, Ahmad Haiqal, Che Hassan, Ahmad Yusuf, Hambari, Mohd Norhafizi

    Published 2019
    “…Besides, it will reduce the steps to get approval for any event. In this research, its content of the step on how to apply the method of WfMS in a mobile application with the use of an android studio. …”
    Get full text
    Get full text
    Student Project
  10. 10

    A computational framework for predicting software quality-in-use from software reviews by Atoum, Issa

    Published 2015
    “…Software Quality-in-Use (QinU) lies in the eyes of its users. QinU has gained its importance in egovernment, mobile-based, and web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. Using a given geographical coordinates, it provides human-readable addresses and other related information. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Internet of things (IoT) based grid tension monitoring system by Lina Khalida, Norazmi

    Published 2022
    “…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis