Search Results - (( developing mobile ad algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…Mobile ad hoc network is a collection of mobile nodes forming dynamic and temporary network. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    A dynamic energy savvy routing algorithm for mobile Ad-hoc and sensor networks by Mohamad Nazim, Jambli, Adnan Shahid, Khan, Halikul, Lenando, Jiwa, Abdullah, Sinarwati, Mohamad Suhaili

    Published 2017
    “…Mobile Ad-hoc and Sensor Networks (MASNETs) are energy constrained networks which have been the focus of many recent research and development efforts. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…Abstract Mobile Ad hoc networks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Mobile Ad hoc NETwork (MANET) is a set of wireless mobile nodes temporary connected without existing network infrastructure or centralized administrations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Mobile student study planner by Chai, Jia Yuan

    Published 2020
    “…Therefore, this project entitled “Mobile Student Study Planner” is to implement a study planner as a mobile application with some added features as compared to the existing applications in the marketplace. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan by Hasan, Norfadhilah

    Published 2005
    “…Mobile Ad-hoc Network (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  16. 16

    Mobile cookbook application with searching by ingredients / Falihah Mamat @ Mohammad by Mamat @ Mohammad, Falihah

    Published 2015
    “…Frustrating things when preparing a meal is forgetting the key ingredients.Through this project, a cookbook mobile application will be developed using agile framework. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…Security is a critical problem in implementing mobile ad hoc networks (MANETs) because of their vulnerability to routing attacks. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…Vehicular Ad hoc Network (VANET) clustering is an active research area where a group of connected vehicles forms an ad hoc network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
    Get full text
    Get full text
    Article
  20. 20

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…With the prevalence of multimedia applications and the potential commercial usage of Mobile Ad hoc Networks (MANETs) in group communications, Quality of Service (QoS) support became a key requirement. …”
    Get full text
    Get full text
    Article