Search Results - (( phone application testing algorithm ) OR ( _ application use algorithm ))

Refine Results
  1. 1
  2. 2

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam by Affendy Azam, Nursalsabiela

    Published 2020
    “…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…For example, mobile control can control other device via mobile phone just by using the application such as television, air conditioner, lamp and fan. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12
  13. 13

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…The developed application is tested on real equipment such as a Nokia N70. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Most of the proposed solutions focused only on the Desktop versions of web applications and overlooked the mobile versions. Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Online handwritten signature recognition by length normalization using up-sampling and down-sampling by Malallah, Fahad Layth, Syed Ahmad, Sharifah Mumtazah, Wan Adnan, Wan Azizun, Arigbabu, Olasimbo Ayodeji, Iranmanesh, Vahab, Yussof, Salman

    Published 2015
    “…In this paper, we introduce an efficient algorithm for online signature length normalization by using Up-Sampling and Down-Sampling techniques. …”
    Get full text
    Get full text
    Article
  18. 18

    AUTO-MANAGE PARKING SYSTEM (AMPS) by KHAIRUDDIN, MUHAMMAD AMIRUL SYAFIQ

    Published 2019
    “…User then able to pay parking fees by using mobile phone through android application linked with user’s number plate. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…This application can be installing into the mobile phone.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Genetic case-based reasoning for improved mobile phone faults diagnosis by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Arunkumar, N., Obaid, Omar Ibrahim, A. Mostafa, Salama, Musa Jaber, Mustafa, Burhanuddin, M.A., Mohammed Matar, Bilal, Abdullatif, Saif Khalid, Ahmed Ibrahim, Dheyaa

    Published 2018
    “…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
    Get full text
    Get full text
    Article