Search Results - (( java application testing algorithm ) OR ( mobile information using algorithm ))
Search alternatives:
- application testing »
- mobile information »
- testing algorithm »
- information using »
- java application »
- using algorithm »
-
1
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
Get full text
Get full text
Conference or Workshop Item -
7
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
8
Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah
Published 2013“…The Bug algorithm is a local path planning methodology for mobile robot which detects the nearest obstacle as the robot moves towards a target with no or very limited information about the environment. …”
Get full text
Get full text
Thesis -
9
-
10
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
11
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…Each robot has a limited view of the environment, and they communicate with their neighbouring robots to share information about their current position. The proposed algorithm was developed using MATLAB and implemented within ROS2, which are widely used in the robotics industry. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
14
-
15
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
Get full text
Get full text
Thesis -
16
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS
Published 2020“…Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Autonomous path planning robot using geographical information
Published 2008Get full text
Learning Object -
19
Mobile robot safe navigation in unknown environment
Published 2012“…This paper provides a mobile robot navigation strategy using fuzzy logic is developed for a two wheeled mobile robot in a static environment. …”
Get full text
Conference or Workshop Item -
20
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
Get full text
Get full text
Get full text
Article
