Search Results - (( web application based algorithm ) OR ( phone applications ((a algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review by Ahmad Alif, Kamal, Mohd. Asyraf, Mansor, Liyana, Truna, Norhunaini, Mohd. Shaipullah, Nor Hafizie, Habib Sultan

    Published 2025
    “…Machine learning (ML) is an emerging field, while multiplayer online battle arena (MOBA) esports has seen a rise as a research subject of interest. The applications of ML in MOBA are an interesting field of study as the esports genre is enriched by a plethora of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Genetic case-based reasoning for improved mobile phone faults diagnosis by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Arunkumar, N., Obaid, Omar Ibrahim, A. Mostafa, Salama, Musa Jaber, Mustafa, Burhanuddin, M.A., Mohammed Matar, Bilal, Abdullatif, Saif Khalid, Ahmed Ibrahim, Dheyaa

    Published 2018
    “…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis