Search Results - (( tender evaluation method algorithm ) OR ( mobile information based algorithm ))*
Search alternatives:
- mobile information »
- tender evaluation »
- information based »
- method algorithm »
-
1
Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection
Published 2017Get full text
Get full text
Final Year Project -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS)
Published 2008“…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
Get full text
Get full text
Get full text
Thesis -
5
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
Get full text
Get full text
Thesis -
6
-
7
TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS
Published 2020“…Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Book recommender mobile application / Amir Imran Kamaludin
Published 2021Get full text
Get full text
Thesis -
9
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
10
-
11
Autonomous path planning robot using geographical information
Published 2008Get full text
Learning Object -
12
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
14
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…Overall, the proposed algorithm provides an efficient solution for the coordination of mobile robots in the rendezvous task, where the algorithm is capable of handling different group scenarios and is coordinate-free. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Secure mobile AES encryptor (SMAE)
Published 2016“…This can be proved where the National Security Agency (NSA) in the United States to encrypt confidential data and information. This application will focus more on the user of the Android operating systems based mobile phone users. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…A case study was carried out to reverse engineering the mobile botnet codes. Based on the findings, this mobile botnet has successfully posed itself as a fake anti-virus and has the capability to steal important data such as username and password from the Android-based devices. …”
Proceedings Paper -
18
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
19
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
20
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
