Search Results - (( mobile applications ((new algorithm) OR (_ algorithm)) ) OR ( code application a algorithm ))
Search alternatives:
- mobile applications »
- code application »
- new algorithm »
- application a »
- a algorithm »
-
1
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
2
Smart and energy aware routing for the internet of mobile things
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
4
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
6
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms".
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
8
-
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. Online attacks have increased to a large extent nowadays and the most common attack among them is data abuse . …”
Get full text
Get full text
Student Project -
11
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
12
-
13
Development of new code for optical code division multiple access systems
Published 2011“…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
Get full text
Thesis -
14
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Algorithm visualization design guidelines for mobile leaning
Published 2018Get full text
Get full text
Get full text
Article -
16
Three-Description Scalar And Lattice Vector Quantization Techniques For Efficient Data Transmission
Published 2015“…As this thesis suggests a new labeling algorithm that uses lattice 4 for three description MDC system. …”
Get full text
Get full text
Thesis -
17
Simulation of handoff algorithm for NDN producer’s mobility
Published 2020“…The mobile producer in node 3 is requesting a video content to another producer in node 4 while in a state of mobility. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
An FPGA implementation of Alamouti's transmit diversity technique
Published 2008“…The implementation demonstrates this space-time code in a baseband system with two transmit and just one antenna at the receiver with the encoding and decoding algorithms using Verilog Hardware Description Language (HDL), which is modeled to establish an end-to-end link over real wireless channels to form a complete multiple antenna wireless communications system.…”
Get full text
Get full text
Thesis -
19
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
20
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item
