Search Results - (( its applications mobile algorithm ) OR ( web application testing algorithm ))

Refine Results
  1. 1

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  2. 2

    Virtual room decorator in android by Nurul Ain, Ahmed

    Published 2012
    “…Also provides a simulation mobile platform to test and validate different rover chassis design,its navigation and locomotion algorithms,and the support rover operation for the application built.Besides,the comparison with the various related current systems and applications in the web browser and usability of popular mobile application platforms also issued here.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…These days, regardless of Geographic Information System (GIS) and Spatial Data Infrastructure (SDI), reverse-geocoding web services provide the backbone of many of web, mobile, and Internet-of-Things (IoT) applications. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system by Jabbar, Waheb A., Annathurai, Sanmathy, Tajul Ariffin, A. Rahim, M. Fitri, Mohd Fauzi

    Published 2022
    “…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. System-level tests are conducted using a fabricated testbed and connected to a solar panel to prove the SEM-LoRaWAN effectiveness in terms of functionality, simplicity, reliability, and cost. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  14. 14

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  18. 18

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…Simulation results show that the proposed FuzSAHO algorithm reduces the number of ping-pong handover and its delay. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20