Search Results - (( mobile applications ((new algorithm) OR (_ algorithm)) ) OR ( code application use algorithm ))
Search alternatives:
- mobile applications »
- code application »
- application use »
- new algorithm »
- use algorithm »
-
1
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
3
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
5
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms".
Published 2024“…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Article -
7
-
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Encryption and decryption are used for image-based authentication here. Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
Get full text
Get full text
Student Project -
10
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
11
-
12
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
13
An FPGA implementation of Alamouti's transmit diversity technique
Published 2008“…There is demand for ever faster wireless communications as this will allow for new applications such as wireless broadband Internet access. …”
Get full text
Get full text
Thesis -
14
Three-Description Scalar And Lattice Vector Quantization Techniques For Efficient Data Transmission
Published 2015“…As this thesis suggests a new labeling algorithm that uses lattice 4 for three description MDC system. …”
Get full text
Get full text
Thesis -
15
Simulation of handoff algorithm for NDN producer’s mobility
Published 2020“…These set-ups of simulation were conducted using NetSim version 12.10 software. In the results, we present video application throughput and the link throughput of link 1, link 2 and link 7 and comprehend that, efficiency and seamless mobility is realized using video application as compared to link throughout. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Algorithm visualization design guidelines for mobile leaning
Published 2018Get full text
Get full text
Get full text
Article -
17
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
19
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
20
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
Published 2011“…Nowadays the advancement of technologies has reached the massive growth and commercial success in multimedia and mobile communication. The advancement and development in video coding technology, together with the increase of storage capacity network infrastructures and computing power are enabling an increasing number of video applications. …”
Get full text
Get full text
Book
