Search Results - (( web applications mobile algorithm ) OR ( its application ((a algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
    Proceedings Paper
  3. 3
  4. 4

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  5. 5

    Virtual room decorator in android by Nurul Ain, Ahmed

    Published 2012
    “…Also provides a simulation mobile platform to test and validate different rover chassis design,its navigation and locomotion algorithms,and the support rover operation for the application built.Besides,the comparison with the various related current systems and applications in the web browser and usability of popular mobile application platforms also issued here.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    A computational framework for predicting software quality-in-use from software reviews by Atoum, Issa

    Published 2015
    “…Software Quality-in-Use (QinU) lies in the eyes of its users. QinU has gained its importance in egovernment, mobile-based, and web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Internet of things (IoT) based grid tension monitoring system by Lina Khalida, Norazmi

    Published 2022
    “…The findings of the prototype showed a functional website and mobile application in which the digital display accurately displays readings in accordance with its intended purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. Using a given geographical coordinates, it provides human-readable addresses and other related information. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…In the software development, a mobile application was implemented on an Android platform to enable mobile users to view and monitor the cathodic protection seamlessly from anywhere around the world. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Nonetheless, users frequently experience poor performance in accessing web sites or downloading files primarily when they use mobile devices due to their limited storage, processing, display, power and communication resources.. …”
    Get full text
    Get full text
    Article
  17. 17

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers