Search Results - (( mobile applications ((new algorithm) OR (_ algorithm)) ) OR ( code application a algorithm ))

Refine Results
  1. 1

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
    Get full text
    Get full text
    Article
  6. 6

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms". by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…Numerous data security and hiding algorithms have been developed in the last decade. Online attacks have increased to a large extent nowadays and the most common attack among them is data abuse . …”
    Get full text
    Get full text
    Student Project
  11. 11

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
    Get full text
    Thesis
  14. 14

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Three-Description Scalar And Lattice Vector Quantization Techniques For Efficient Data Transmission by Teo, Hui Ting

    Published 2015
    “…As this thesis suggests a new labeling algorithm that uses lattice 4 for three description MDC system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An FPGA implementation of Alamouti's transmit diversity technique by Mukilan, Pushpamalar

    Published 2008
    “…The implementation demonstrates this space-time code in a baseband system with two transmit and just one antenna at the receiver with the encoding and decoding algorithms using Verilog Hardware Description Language (HDL), which is modeled to establish an end-to-end link over real wireless channels to form a complete multiple antenna wireless communications system.…”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20