Search Results - (( mobile application a algorithm ) OR ( some application testing algorithm ))*

Refine Results
  1. 1

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  2. 2
  3. 3

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…To solve this problem, a mobile application has been proposed for customers to order their food and drink easily and the owner can manage the order without any restrictions. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Rapid Penang travel planner mobile application using GPS positioning and decision-making algorithm / Naslyiana Abdul Latif by Abdul Latif, Naslyiana

    Published 2015
    “…The method used to implement this project is Rapid Application Development (RAD). This application have been tested to 25 respondents. 22 respondents are local pedestrians and 3 respondents are outside traveler. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Therefore, this proposed stress mental health symptom assessment mobile application can allow users to conduct a stress assessment session in the application to generate a report of the stress level. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Mobile application is chosen to be the main platform for the project, as it is much faster for the community to file a complaint as soon as a stray animal issue is noticed. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9
  10. 10

    Storify : Protecting privacy of social media post with hash-based anonymity by Jackie Chin Yong An

    Published 2022
    “…The objectives of this project are to investigate a lightweight hash-based anonymity algorithm in protecting the privacy of social media post, in terms of computation speed and ciphertext size, to design and develop the proposed Storify mobile social media application by using prototype development approach and to evaluate the performance of the developed Storify mobile social media application by using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11
  12. 12
  13. 13

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks by Alzyoud, Faisal Yousef Abed-alrahman

    Published 2011
    “…Furthermore, P-XCAST is merged with a proposed Group Management algorithm to handle node mobility by classifying nodes into two types: group head and member. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks by Al-Zyoud, Faisal Yousef Abed-alrahman

    Published 2011
    “…Furthermore, P-XCAST is merged with a proposed Group Management algorithm to handle node mobility by classifying nodes into two types: group head and member. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19
  20. 20