Search Results - (( mobile applications ((new algorithm) OR (tree algorithm)) ) OR ( web application _ algorithm ))
Search alternatives:
- mobile applications »
- web application »
- tree algorithm »
- new algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
Get full text
Get full text
Get full text
Thesis -
3
A new multicast-based architecture to support host mobility in IPv6
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
5
-
6
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
Get full text
Get full text
Get full text
Article -
7
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
8
Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.]
Published 2009“…A Route Planner Mobile Web Application for UiTM Malaysia has been developed to produce a list of routes from two selected points in order of the shortest first. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
A new multicast-based architecture to support host mobility in IPv6
Published 2003Get full text
Get full text
Conference or Workshop Item -
12
-
13
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
14
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
Get full text
Get full text
Get full text
Article -
15
Intersection Features For Android Botnet Classification
Published 2019“…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Reverse migration prediction model based on machine learning / Azreen Anuar
Published 2024“…For this purpose, three (3) algorithms have been assessed, namely, the Random Forest, Decision Tree, and Gradient Boosted Tree. …”
Get full text
Get full text
Thesis -
18
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
20
Lightweight Cryptography Techniques for MHealth Cybersecurity
Published 2024“…A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. …”
Proceedings Paper
