Search Results - (( phone application based algorithm ) OR ( _ application among algorithm ))*
Search alternatives:
- phone application »
- application based »
- application among »
- among algorithm »
-
1
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
Get full text
Get full text
Thesis -
2
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
3
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article -
4
Optimization of ANPR algorithm on android mobile phone
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
Get full text
Get full text
Article -
7
-
8
Development of eCall for Malaysia's automotive industries
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
Get full text
Get full text
Thesis -
10
-
11
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Content-based indexing of low resolution documents
Published 2016“…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
18
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
19
-
20
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…In a cloud computing environment, a device can be varied from a high-end computing workstation to mobile devices like smart phone or PDA to respond efficiently to such diversified environment, a cloud-based system must possess mechanisms that allow applications requested delivered fit according to the client device's characteristics and capabilities. …”
Get full text
Get full text
Research Reports
