Search Results - (( web application based algorithm ) OR ( mobile applications _ algorithm ))

Refine Results
  1. 1

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  3. 3

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An integration of AHP-ACO technique for social interaction and travel planning by Peh, Perly Thai Ee

    Published 2016
    “…The current web and mobile computing technologies have encouraged all sorts of applications mushroom in the market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…To solve this problem, a mobile application has been proposed for customers to order their food and drink easily and the owner can manage the order without any restrictions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route by Haziq Lim, AM, Wan Sazli, NS, Hussin, B., Azlianor, A. A., Suhaizan, SM, Massila, K

    Published 2010
    “…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar... by Shamsudin, Muhammad Azziq, Aminuddin, Raihah, Abdul Jalil, Ummu Mardhiah

    Published 2022
    “…The web application requires the user to input of their Rest Heart Rate (RHR), age and level of exercise intensity to produce output of THR zone according to their facial expression. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11
  12. 12
  13. 13

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…Therefore, in order to mitigate the situation, few approaches in Mobile Application Technologies have been explored such as the “MySejahtera” app and the “MyTrace” app. …”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15
  16. 16

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…The objectives of this research are to develop a Malaysian license plate recognition system using a Convolutional Neural Network (CNN) on a web application and evaluate the performance of the system based on accuracy and loss values. …”
    Get full text
    Get full text
    Student Project
  17. 17

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhancing unity-based AR with optimal lossless compression for digital twin assets by Hlayel, Mohammed, Hairulnizam, Mahdin, Hayajneh, Mohammad, AlDaajeh, Saleh H., Siti Salwani, Yaacob, Mazidah, Mat Rejab

    Published 2024
    “…This study also creates mathematical models for predicting resource utilization, like RAM and CPU time, required by AR mobile applications. Experimental results show a detailed comparison among these compression algorithms, which can give insights and help choose the best method according to the compression ratio, decompression speed, and resource usage. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. We aim to improve on passwords with respect to both usability as well as security. …”
    Get full text
    Get full text
    Get full text
    Thesis