Search Results - (( web application _ algorithm ) OR ( phone application ((means algorithm) OR (based algorithm)) ))
Search alternatives:
- phone application »
- web application »
- means algorithm »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Mobile tour guide application with attraction recognition for UTAR Kampar campus
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article -
4
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
5
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
6
Dermedys: Android-based dermatological diagnostic and analytic expert system
Published 2017“…An android application, ‘Dermedys’ with a knowledge base of five erythemato-squamous diseases was developed to implement the algorithm.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…Other than that, most of the solution focuses on the android apk file, instead of visualizing the apk into image-based form. The objective of this project is to build a web apps to classify malware by transforming the apk file into image-based representation. …”
Get full text
Get full text
Conference or Workshop Item -
8
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
-
11
Optimization of ANPR algorithm on android mobile phone
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
-
14
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
Get full text
Get full text
Article -
15
-
16
Contactless palmprint verification using siamese networks
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review
Published 2025“…Papers were included if they contained ML applications for MOBA, excluding game design or non-esports-related studies. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
Get full text
Get full text
Thesis -
20
