Search Results - (( mobile application new algorithm ) OR ( _ application server algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Unlike current systems that either perform analyses on the device or send the whole application to a server for analyses, our system has the distinction of extracting features on the device and analysing them on the Google App Engine servers using an offloading technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7
  8. 8

    Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model by Lawal, Ibrahim A., Ibrahim, Adamu Abubakar, Zammarah, Nuha Abdullah

    Published 2022
    “…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Findings:The framework uses authenticated mobile agents from both client and cloud server provider to perform the task on behalf of users to establish trustworthy computing relationship. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment by Zarrin, Javad

    Published 2009
    “…The problem is that the most of service discovery protocols are not effective for wireless Ad- Hoc networks and ubiquities environments, efficiency in case of service quality and power consumption. In this research a new mechanism and algorithm is designed to improve current wireless service discovery protocols. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…While the UOCC AR mobile application allow users to view machining setup process through Augmented Reality guide therefore improving the average operating time for experienced users (42.46%) and non-experienced (28.36%). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Such instability poses serious challenge for fault tolerant distributed mobile applications. Therefore, the classical checkpointing techniques, which make the applications more failure-resistant, are not always compatible with the mobile context. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A new model of application response time for VoIP over WLAN and fixed WiMAX by Nisar, K., Hijazi, M.H.A., Lawal, I.A.

    Published 2015
    “…The model was simulated in the OPNET modeler (16.0) with Multiple Access Points (APs), Base Stations (BSs)as well as mobile devices, Subscribers Stations (SSs), and some server BSs that were selected based on Nearest Neighborhood Algorithm and Orthogonal Frequency Division Multiplexing (OFDM) techniques. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Capacity Enhancement Of Cellular Network Using Wifi Offloading by Ab. Wahab, Nazdiana

    Published 2019
    “…The growing popularity of bandwidth-intensive applications as well as the proliferation of mobile devices in Malaysia has resulted in the accelerated growth of mobile data traffic or also known as the mobile data explosion phenomena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis