Search Results - (( web application among algorithm ) OR ( mobile applications _ algorithm ))
Search alternatives:
- mobile applications »
- application among »
- web application »
- among algorithm »
-
1
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
3
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
4
Enhancing unity-based AR with optimal lossless compression for digital twin assets
Published 2024“…This study also creates mathematical models for predicting resource utilization, like RAM and CPU time, required by AR mobile applications. Experimental results show a detailed comparison among these compression algorithms, which can give insights and help choose the best method according to the compression ratio, decompression speed, and resource usage. …”
Get full text
Get full text
Get full text
Article -
5
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
7
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
8
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
9
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
10
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
11
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Applications of mobile robots cover both industrial and domestic area. …”
Get full text
Get full text
Book Chapter -
14
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Graphical user authentication algorithm for mobile banking user
Published 2018Get full text
Get full text
Get full text
Article -
17
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
Get full text
Get full text
Thesis -
19
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…In this review paper, a comprehensive review of mobile robot navigation algorithms has been conducted. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Dynamic path planning algorithm in mobile robot navigation
Published 2011“…In this research, Genetic Algorithm (GA) is used to assist mobile robot to move, identify the obstacles in the environment, learn the environment and reach the desired goal in an unknown and unrecognized environment. …”
Get full text
Get full text
Conference or Workshop Item
