Search Results - (( code visit a algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    Simulation of handoff algorithm for NDN producer’s mobility by Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha, Mohd. Ramli, Huda Adibah, Khalifa, Othman Omran, Alkali, Abdulkadir Hamidu, Adamu, Zainab Mohammed

    Published 2020
    “…In this form of handoff, the carrier frequency of a connecting access gateway remains the same with the newly visited gateway of the producer (i.e intra-frequency). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin by Husam , N. S. Yasin

    Published 2021
    “…It is a fully automated black-box testing approach that uses Upper Confidence Bound (UCB) exploration-exploitation strategy to generate actions that visit unexplored states of the app and uses the execution of the app on the generated actions to construct a state-transition model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…This process that requires users to enter a pre-determined code to authenticate users is not a robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis