Search Results - (( its application tools algorithm ) OR ( mobile application during algorithm ))*

Refine Results
  1. 1

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm by Ahmad@Mohd Yusoff, Faisul Arif

    Published 2016
    “…It is also known as application that applies large number of mobile robot. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
    Get full text
    Get full text
    Article
  11. 11

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…As mobile crowd steering applications require user interaction during fire evacuation, we have foreseen a gap in current simulation algorithms, which leads to unrealistic simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  18. 18
  19. 19
  20. 20